Which of the following ports should be blocked on the firewall to achieve this?
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should
be blocked on the firewall to achieve this?
Which of the following security devices is used in providing packet and MAC address filtering services for the
Which of the following security devices is used in providing packet and MAC address filtering
services for the network?
Which of the following attacks may be in progress?
Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the
following attacks may be in progress?
Which of the following attacks has the network MOST likely experienced?
Users are unable to access the company’s intranet website. Which of the following attacks has the
network MOST likely experienced?
Which of the following performs posture assessments for unknown devices that connect to the network?
Which of the following performs posture assessments for unknown devices that connect to the
network?
Which of the following would be used to test out the security of a specific network by allowing it to receive
Which of the following would be used to test out the security of a specific network by allowing it to
receive security attacks?
which of the following?
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed
though or dumped is a example of which of the following?
Which of the following security measures could he use to set up this functionality?
Zach, an administrator, wants to eliminate remote access to a network from all users, except those
users in Zach’s own country. Which of the following security measures could he use to set up this
functionality?
Which of the following ports need to be enabled on the firewall?
Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for
business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
Which of the following security measures would BEST secure their wireless network?
A company has only three laptops that connect to their wireless network. The company is currently
using WEP encryption on their wireless network. They have noticed unauthorized connections on
their WAP and want to secure their wireless connection to prevent this. Which of the following
security measures would BEST secure their wireless network? (Select TWO).