Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does
Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?
Which of the following technologies allows multiple staff members to connect back to a centralized office?
Which of the following technologies allows multiple staff members to connect back to a centralized
office?
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
Which of the following can be configured to restrict specific ports and IP addresses from accessing the intern
Which of the following can be configured to restrict specific ports and IP addresses from accessing
the internal network? (Select TWO).
which of the following should Karen, a network technician, take into consideration to reduce signal exposure f
Before installing a wireless network, which of the following should Karen, a network technician, take
into consideration to reduce signal exposure for war drivers?
Which of the following can Joe implement?
Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the
internal web server’s private IP. Which of the following can Joe implement?
Which of the following will accomplish this?
Sandy, a home user, wishes to confine a wireless network to devices ONLY inside of her house.
Which of the following will accomplish this?
Which of the following measures will accomplish this?
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway
tunnel. Which of the following measures will accomplish this?
Which of the following would be the MOST secure connection method?
Sandy, an administrator, must connect to a remote UNIX server securely. Which of the following
would be the MOST secure connection method?
Which of the following must Joe implement to assign a different public IP from the router’s public interface
After installing a SOHO wireless router, Joe, the network administrator, notices that all internal RFC
1918 IP addresses are being logged by an Internet web server as coming from the router’s public
interface IP address. Which of the following must Joe implement to assign a different public IP from
the router’s public interface IP address to one of the workstations in the office?