Which of the following would MOST likely be configured on the firewall?
The company is setting up a new website that will be requiring a lot of interaction with external
users. The website needs to be accessible both externally and internally but without allowing access
to internal resources. Which of the following would MOST likely be configured on the firewall?
Which of the following provides RSA encryption at the session layer?
Which of the following provides RSA encryption at the session layer?
Which of the following is MOST commonly implemented for remote access to UNIX systems?
Which of the following is MOST commonly implemented for remote access to UNIX systems?
Which of the following is the MOST important aspect of the deployment?
A network administrator is tasked with deploying a company-wide wireless system which allows for
accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the
following is the MOST important aspect of the deployment?
Which of the following would be the BEST solution for an IDS to monitor known attacks?
Which of the following would be the BEST solution for an IDS to monitor known attacks?
WirelessB is MOST likely a:
A technician working for a company with a wireless network named WirelessA notices a second
wireless network named WirelessB. WirelessB is MOST likely a:
Which of following types of authentication is this an example of?
A technician needs to enter a username and password and have their fingerprint scanned to access a
server. Which of following types of authentication is this an example of?
Which of the following should the network administrator review?
A network administrator is setting up a WAP and wants to disable the ability of gaining access from
the parking garage. Which of the following should the network administrator review?
Which of the following is described by this example?
A network administrator decides to secure their small network by allowing only specific MAC
addresses to gain access to the network from specific switches. Which of the following is described
by this example?
Which of the following can use a third party back-end LDAP user database for authentication?
Which of the following can use a third party back-end LDAP user database for authentication?