Which of the following protocols is used to authenticat…
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following protocol would be MOST appropriate?
A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail
server of a business partner. Which of the following protocol would be MOST appropriate?
Which of the following should be implemented to stop an…
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices
on a network?
Which of the following BEST describes this type of record?
When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which
of the following BEST describes this type of record?
which of the following should be powered on FIRST to es…
A network technician is on the phone with the system administration team. Power to the server room was lost
and servers need to be restarted. The DNS services must be the first to be restarted. Several machines are
powered off. Assuming each server only provides one service, which of the following should be powered on
FIRST to establish DNS services?
Which of the following protocols could be utilized?
A UNIX administrator would like to use native commands to provide a secure way of connecting to other
devices remotely and to securely transfer files. Which of the following protocols could be utilized? (Choose
two.)
Which of the following protocols would provide secure a…
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the
following protocols would provide secure access?
Which of the following is BEST used as a secure replace…
Which of the following is BEST used as a secure replacement for TELNET?
Which of the following protocols should be used instead…
A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following protocols
should be used instead of Telnet?
Which of the following protocols would he need to confi…
Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely
monitor their status. Which of the following protocols would he need to configure on each device?