Which of the following would BEST provide this functionality?
A network administrator is looking to implement a solution allowing users to utilize a common
password to access most network resources for an organization. Which of the following would
BEST provide this functionality?
which of the following security features for controlling access?
A strong network firewall would likely support which of the following security features for controlling
access? (Select TWO).
Which of the following solutions provides the MOST security from third party tampering?
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A
network administrator is assigned to provide connectivity between the existing office and the new
office. Which of the following solutions provides the MOST security from third party tampering?
which of the following layers of the OSI model does the problem MOST likely reside?
Users at a remote site are unable to establish a VPN to the main office. At which of the following
layers of the OSI model does the problem MOST likely reside?
Which of the following protocols needs to be denied?
A network technician is concerned that an attacker is attempting to penetrate the network, and
wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are
valid on the network. Which of the following protocols needs to be denied?
Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have
reported that they are unable to access Internet websites. The technician verifies this using the IP
address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing t
Which of the following describes a single computer that is setup specifically to lure hackers into
revealing their methods, and preventing real attacks on the production network?
Which of the following network appliances will only detect and not prevent malicious network activity?
Which of the following network appliances will only detect and not prevent malicious network
activity?
Which of the following should the network administrator implement on the WAP?
A network administrator is implementing a wireless honeypot to detect wireless breach attempts.
The honeypot must implement weak encryption to lure malicious users into easily breaking into the
network. Which of the following should the network administrator implement on the WAP?
Which of the following would BEST help Joe?
Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs
to quickly determine which workstation is infected with the virus. Which of the following would
BEST help Joe?