Which of the following will provide all of the requirements?
A network technician needs to require users on the network to log in, log access to network
resources, and control access to network resources. Which of the following will provide all of
the requirements?
Which of the following should be completed after installing the server?
An administrator receives a contract for a server install at a new building. Which of the
following should be completed after installing the server?
Which of the following is a reason to block FTP at the corporate firewall?
Which of the following is a reason to block FTP at the corporate firewall?
which of the following layers does a hub function?
On which of the following layers does a hub function?
which of the following?
A network IPS provides which of the following?
Which of the following should be implemented to allow for a secure wireless network for the customer while mee
A customer in a shared office space wants to secure the companys wireless network. The
customer wants to be able to allow clients to come in and still be able to connect to the
wireless network without any changes to the network. Which of the following should be
implemented to allow for a secure wireless network for the customer while meeting the
customers requirements? (Select TWO).
Which of the following is the address that can be used in this scenario?
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a
classful address. Which of the following is the address that can be used in this scenario?
Which of the following should be configured on the switch to utilize the IPS?
A technician is setting up an IPS security device. Which of the following should be
configured on the switch to utilize the IPS?
Which of the following should be configured to provide priority to voice traffic?
Which of the following should be configured to provide priority to voice traffic?
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?
Which of the following protocols is the LEAST secure and should be avoided on a wireless
network?