which of the following?
A firewall that looks at the source IP and destination IP then routes them accordingly is an
example of which of the following?
Which of the following commands should the administrator use?
An administrator is experiencing availability issues on a Linux server. The administrator
decides to check the server for an IP address conflict on the server. Which of the following
commands should the administrator use?
The process that allows for authentication between computers as a precursor to IPSec is:
The process that allows for authentication between computers as a precursor to IPSec is:
Which of the following protocols is commonly used for VoIP technology?
Which of the following protocols is commonly used for VoIP technology?
which of the following?
A router that takes the workstations internal IP address and changes it to another IP address
when it sends the data outside of the network is an example of which of the following?
Which of the following services could be used in this scenario?
An administrator is responsible for one Linux and two Windows servers. The administrator
would like to review all server logs centrally. Which of the following services could be used in
this scenario?
Which of the following will MOST likely be used between the modem and the ISP?
A company has recently received a new ADSL backup Internet connection. Which of the
following will MOST likely be used between the modem and the ISP?
Which of the following methods could be used to provide a false customer database to the attacker?
A network administrator has discovered attempts to penetrate the network and access the
customer database. Which of the following methods could be used to provide a false
customer database to the attacker?
Which of the following would MOST likely be used with multimode fiber?
Which of the following would MOST likely be used with multimode fiber?
Which of the following would only alert a network technician of a possible attack, but take no action to stop
Which of the following would only alert a network technician of a possible attack, but take no
action to stop the attack?