Which of the following would MOST likely be installed?
A system administrator is implementing an IDS on the database server to see who is trying to
access the server. The administrator relies on the software provider for what to detect. Which of
the following would MOST likely be installed?
Which of the following should have been implemented?
A vendor releases an emergency patch that fixes an exploit on their network devices. The network
administrator needs to quickly identify the scope of the impact to the network. Which of the
following should have been implemented?
which of the following VLANs?
Users report that they are unable to access the production server with IP address 192.168.30.17.
These users need to be provided access without changing any subnet to VLAN information. The
VLANs configured on the network are listed below:
DepartmentVLAN #Subnet used
Marketing20192.168.20.0/28
Customer Service25192.168.20.64/28
Finance30192.168.30.0/28
WHSE35192.168.30.16/28
Sales40192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
Which of the following can be described as a DoS attack?
Which of the following can be described as a DoS attack?
Which of the following is the MOST likely security threat?
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the
following is the MOST likely security threat?
Which of the following addresses is a class B private address?
Which of the following addresses is a class B private address?
Which of the following could be used to make sure sessions are being opened properly?
An application server is placed on the network and the intended application is not working
correctly. Which of the following could be used to make sure sessions are being opened properly?
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet
Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on
the same subnet?
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same netw
Which of the following allows a malicious attacker to view network traffic if the attacker is on the
same network segment as Joe, an administrator?