Which of the following can be used?
A network administrator wants to separate the network into broadcast domains. Which of the following can be used? (Select TWO).
Which of the following protocols uses port 3389?
Which of the following protocols uses port 3389?
Which of the following ports should be blocked on the firewall to achieve this?
A technician is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
Which of the following utilities would a technician use to resolve the FQDN of a web server to its IP address?
Which of the following utilities would a technician use to resolve the FQDN of a web server to its IP address?
Which of the following could be used to inspect connection setup, request, and response headers for users conn
Which of the following could be used to inspect connection setup, request, and response headers for users connecting to a web server?
Which of the following attacks is in progress?
A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress?
Which of the following identifies the location?
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
Which of the following can the technician deploy to accomplish this?
A technician needs to be able to direct all incoming HTTP requests containing the company cookie to the DMZ web server and all other incoming HTTP requests to the internal web server. Which of the following can the technician deploy to accomplish this?
Which of the following ports does a web browser use by default?
Which of the following ports does a web browser use by default?
Which of the following protocols is used to transmit outgoing email?
Which of the following protocols is used to transmit outgoing email?