Which of the following is the control when observing network bandwidth patterns over time?
Which of the following is the control when observing network bandwidth patterns over time?
Which of the following security measures would BEST fulfill this need?
The security administrator needs to restrict specific devices from connecting to certain WAPs.
Which of the following security measures would BEST fulfill this need?
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all i
Which of the following performs authentication and provides a secure connection by using 3DES
to encrypt all information between two systems?
Which of the following would need to be configured to prevent any further attacks from that IP address?
Several users are reporting connectivity issues with their laptops. Upon further investigation, the
network technician identifies that their laptops have been attacked from a specific IP address
outside of the network. Which of the following would need to be configured to prevent any further
attacks from that IP address?
Which of the following would MOST likely be configured on the firewall?
The company is setting up a new website that will be requiring a lot of interaction with external
users. The website needs to be accessible both externally and internally but without allowing
access to internal resources. Which of the following would MOST likely be configured on the
firewall?
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server fro
Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subn
Which of the following would be used to check whether a DoS attack is taking place from a
specific remote subnet?
Which of the following tools would appropriately diagnose the problem?
An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is
suspected. Which of the following tools would appropriately diagnose the problem?
Which of the following can a network technician change to help limit war driving?
Which of the following can a network technician change to help limit war driving?
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its defau
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass
on its default port?