Which of the following protocols needs to be denied?
A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a
rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of
the following protocols needs to be denied?
Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that
they are unable to access Internet websites. The technician verifies this using the IP address of a popular
website. Which of the following is the MOST likely cause of the error?
Whichof the following identifies the location?
The ISP needs to terminate the WAN connection. The connection should be located in the network server
room where the company LAN equipment resides. Whichof the following identifies the location?
Which of the following is the BEST way to mitigate such an equipment failure?
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department
would like a way to prevent such an incident in thefuture. Which of the following is the BEST way to mitigate
such an equipment failure?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing t
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their
methods, and preventing real attacks on the production network?
Which of the following is the FASTEST Ethernet technology?
Which of the following is the FASTEST Ethernet technology?
Which of the following would BEST accomplish this goal?
A Chief Executive Officer (CEO) decided that only alimited number of authorized company workstations will be
able to connect to the Internet. Which of the following would BEST accomplish this goal?
Which of the following will accomplish this objective?
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS
network traffic will no longer be permitted. Which of the following will accomplish this objective?
which of the following?
Companies trying to cut down on constant documentation of IP addresses could use which of the following?
Which of the following is MOST likely the problem?
Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on
and around the cable that connects the teacher’s station, a few feet away, to the same hub. The teacher is
experiencing no network connectivity. Which of the following is MOST likely the problem?