Which of the following would be used to implement wireless security with single sign-on?
A company wants to simplify network authentication for their users. Which of the following would
be used to implement wireless security with single sign-on?
Which of the following ports is used by Telnet?
Which of the following ports is used by Telnet?
Which of the following BEST describes the user authentication being used?
The company requires all users to authenticate to the network with a smart card, a pin number,
and a fingerprint scan. Which of the following BEST describes the user authentication being used?
Which of the following protocols can be implemented to provide encryption during transmission between email ga
Which of the following protocols can be implemented to provide encryption during transmission
between email gateways?
Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses?
Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses?
Which of the following authentication methods is MOST secure?
Which of the following authentication methods is MOST secure?
Which of the following should be implemented?
A user wants to send information and ensure that it was not modified during transmission. Which
of the following should be implemented?
Which of the following protocols could the below packet capture be from?
Which of the following protocols could the below packet capture be from?
Port: 161
msgVersion: <masked>
msgUsername: <masked>
msgAuthenticationParameters: <masked>
msgPrivacyParameters: <masked>
msgData:
data: get-request
request-iD. <masked>
error-status: noError (0)
error-index: 0
variable-bindings: 0 items
Which of the following VPN technologies uses IKE and ISAKMP for key exchange?
Which of the following VPN technologies uses IKE and ISAKMP for key exchange?
which of the following ACL entries is the cause?
A user reports that they are unable to access a new server but are able to access all other network
resources. Based on the following firewall rules and network information, which of the following
ACL entries is the cause?
User’s IP: 192.168.5.14
Server IP: 192.168.5.17
Firewall rules:
Permit 192.168.5.16/28192.168.5.0/28
Permit 192.168.5.0/24192.168.4.0/24
Permit 192.168.4.0/24192.168.5.0/24
Deny 192.168.5.0/28192.168.5.16/28
Deny 192.168.14.0/24192.168.5.16/28
Deny 192.168.0.0/24192.168.5.0/24