Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which ports need
to be opened to allow remote access to the system. Which of the following should the technician perform?
which of the following manners would meet the company’s…
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The
company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to
web browsing only. Reordering the ACL in which of the following manners would meet the company’s
objectives?
Which of the following would the technician MOST likely…
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
other using peer to peer communication. Which of the following would the technician MOST likely configure?
Which of the following should the technician install an…
A technician needs to install software onto company laptops to protect local running services, from external
threats. Which of the following should the technician install and configure on the laptops if the threat is network
based?
Which of the following physical security controls preve…
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Which of the following would be identified as physical …
During a check of the security control measures of the company network assets, a network administrator is
explaining the difference between the security controls at the company. Which of the following would be
identified as physical security controls? (Select THREE).
Which of the following could the technician do for vend…
A network technician has set up an FTP server for the company to distribute software updates for their
products. Each vendor is provided with a unique username and password for security. Several vendors have
discovered a virus in one of the security updates. The company tested all files before uploading them but
retested the file and found the virus. Which of the following could the technician do for vendors to validate the
proper security patch?
Which of the following is the BEST security method to i…
A wireless network technician for a local retail store is installing encrypted access points within the store for
real-time inventory verification, as well as remote price checking capabilities, while employees are away from
the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the
wireless networks. There are a finite known number of approved handheld devices needing to access the
store’s wireless network. Which of the following is the BEST security method to implement on the access
points?
Which of the following is the BEST way to accomplish this?
A company wants to make sure that users are required to authenticate prior to being allowed on the network.
Which of the following is the BEST way to accomplish this?
Which of the following should be implemented to reduce …
A company has seen an increase in ransomware across the enterprise. Which of the following should be
implemented to reduce the occurrences?