Which of the following should be used?
A network technician needs to push changes out to network devices and also monitor the devices based on each device# s MIB. Which of the following should be used?
Which of the following would only alert a network technician of a possible attack, but take no action to stop
Which of the following would only alert a network technician of a possible attack, but take no action to stop the attack?
Which of the following methods could be used to provide a false customer database to the attacker?
A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?
Which of the following services could be used in this scenario?
An administrator is responsible for one Linux and two Windows servers. The administrator would like to review all server logs centrally. Which of the following services could be used in this scenario?
The process that allows for authentication between computers as a precursor to IPSec is:
The process that allows for authentication between computers as a precursor to IPSec is:
which of the following?
A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following?
which of the following?
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
Which of the following would be the BEST solution?
A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11g access points with speeds of 54Mbps. The technician would like to increase the bandwidth up to 108Mbps. Which of the following would be the BEST solution?
Which of the following would BEST accomplish this?
The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?
Which of the following would be the BEST solution?
A client is requesting a WAP to be setup at a new location. The client would like the wireless access to be restricted to only four laptops. Which of the following would be the BEST solution?