Which of the following actions would meet the objective?
A network technician is selection the best way to protect a branch office from as many different threat from the
Internet as possible using a single device. Which of the following actions would meet the objective?
The scope of activity as described in the statement of …
A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential
weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of
external contractors will attempt to employ various attacks against the organization. The statement of work
specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop
logical diagrams indication weaknesses in the infrastructure. The scope of activity as described in the
statement of work is an example of:
Which of the following should the company do to reduce …
A network technician has received reports of an Internet-based application that has stopped functioning.
Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled
back the update, but this did not correct problem. Which of the following should the company do to reduce this
type of action from affecting the network?
Which of the following tools would a network technician…
Which of the following tools would a network technician use to troubleshoot a span of single-mode fiber cable?
Which of the following is the most likely cause of this…
A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician
investigates and notices the patch cable running from the back of the user’s VoIP phone is routed directly under
the rolling chair and has been smashes flat over time. Which of the following is the most likely cause of this
issue?
Which of the following can increase visibility inside t…
An organization wants to improve its ability to detect infiltration of servers in a DMZ, IPS/IDS solutions are
currently located on the edge between DMZ and Untrust, and DMZ and Trust. Which of the following can
increase visibility inside the DMZ?
which of the following scenarios?
An engineer is reviewing network logs on a management switch and discovers that, compared to previous
reports, a large amount of traffic is coming from a particular node. Upon further investigation, the engineer
determines traffic coming from the port in question is using points that indicate NAT is occurring somewhere
downstream from that point. After conferring with another network manager, the team determines a user has
added an unauthorized SOHO WLAN router to the network. Among the vulnerabilities that could result from
such an action is the possibility of the user inadvertently connecting the LAN interface of the SOHO router into
the LAN port coming from the corporate network. This configuration would MOST likely result in which of the
following scenarios?
Which of the following topologies would the network adm…
A network administrator was told by the Chef Information Officer (CIO) to set up a new office with a network
that has redundancy. Which of the following topologies would the network administrator need to administer?
what the network administrator will do NEXT?
A network administrator is assigned an approved change request with a change window of 120 minutes. After
90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a
rollback. Which of the following describes what the network administrator will do NEXT?
Which of the following is the BEST way to prevent vario…
Which of the following is the BEST way to prevent various types of security threats throughout the network on a
routine basis?