Which of the following types of network would be set up in an office so that customers could access the Intern
Which of the following types of network would be set up in an office so that customers could
access the Internet but not be given access to internal resources such as printers and servers?
Which of the following options would satisfy these requirements?
A technician needs to limit the amount of broadcast traffic on a network and allow different
segments to communicate with each other. Which of the following options would satisfy these
requirements?
which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
Which of the following actions should the IT security team implement to help protect the network from attack a
A company has decided to update their usage policy to allow employees to surf the web
unrestricted from their work computers. Which of the following actions should the IT security team
implement to help protect the network from attack as a result of this new policy?
Which of the following has MOST likely been implemented at the site with the fewest security issues?
An organization notices a large amount of malware and virus incidents at one satellite office, but
hardly any at another. All users at both sites are running the same company image and receive
the same group policies. Which of the following has MOST likely been implemented at the site with
the fewest security issues?
Which of the following is the BEST security method to implement on the access points?
A wireless network technician for a local retail store is installing encrypted access points within the
store for real-time inventory verification, as well as remote price checking capabilities, while
employees are away from the registers. The store is in a fully occupied strip mall that has multiple
neighbors allowing guest access to the wireless networks. There are a finite known number of
approved handheld devices needing to access the store’s wireless network. Which of the following
is the BEST security method to implement on the access points?
Which of the following forensics actions should Ann perform?
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep
within the directory structure. To ensure the virus has not infected the .mp4 files in the directory,
she views one of the files and believes it contains illegal material. Which of the following forensics
actions should Ann perform?
Which of the following describes a smurf attack?
Which of the following describes a smurf attack?
Which of the following technologies is designed to keep systems uptime running in the event of a disaster?
Which of the following technologies is designed to keep systems uptime running in the event of a
disaster?
Which of the following is the BEST explanation that describes this scenario?
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without
any response from the server. Which of the following is the BEST explanation that describes this
scenario?