Which of the following authentication methods is MOST l…
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator
detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST
likely being attempted?
Which of the following is mainly used for remote access…
Which of the following is mainly used for remote access into the network?
Which of the following is the BEST service for Ann to i…
Ann has taken over as the new head of the IT department. One of her first assignments was to implement AAA
in preparation for the company’s new telecommuting policy. When she takes inventory of the organizations
existing network infrastructure, she makes note that it is a mix of several different vendors. Ann knows she
needs a method of secure centralized access to the company’s network resources. Which of the following is
the BEST service for Ann to implement?
Which of the following relies on the use of shared secr…
Which of the following relies on the use of shared secrets to protect communication?
Which of the following types of security services are u…
Which of the following types of security services are used to support authentication for remote users and
devices?
Which of the following provides RADIUS?
Which of the following provides RADIUS?
what technologies should the authentication protocol be…
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator.
Which of the following is configured in the RADIUS server and what technologies should the authentication
protocol be changed to?
Which of the following is an authentication service tha…
Which of the following is an authentication service that uses UDP as a transport medium?
Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which
can utilize EAP. Which of the following would BEST fit her objective?
Review the server profiles and match them with the appropriate RAID type…
DRAG DROP
A security administrator is given the security and availability profiles for servers that are being deployed.
Match each RAID type with the correct configuration and MINIMUM number of drives.
Review the server profiles and match them with the appropriate RAID type based on integrity, availability, I/O,
storage requirements. Instructions:
All drive definitions can be dragged as many times as necessary
Not all placeholders may be filled in the RAID configuration boxes
If parity is required, please select the appropriate number of parity checkboxes
Server profiles may be dragged only once
Instructions: If at any time you would like to bring back the initial state of the simulation, please select the Reset
button. When you have completed the simulation, please select the Done button to submit. Once the simulation
is submitted, please select the Next button to continue.
Select and Place: