Which of the following should be implemented on the network?
An administrator wants to replace telnet with a more secure protocol to manage a network device. Which of the following should be implemented on the network?
Which of the following is the primary purpose of a CA?
Which of the following is the primary purpose of a CA?
Which of the following is a CRL composed of?
Which of the following is a CRL composed of?
Which of the following type of fire suppression systems should be used?
An administrator wants to ensure that that no equipment is damaged when there is a fire or false alarm in the server room. Which of the following type of fire suppression systems should be used?
Which of the following is the primary purpose of a honeypot?
Which of the following is the primary purpose of a honeypot?
Which of the following devices could the administrator use to BEST utilize stateful packet inspection?
An administrator has been studying stateful packet inspection and wants to implement this security technique on the network. Which of the following devices could the administrator use to BEST utilize stateful packet inspection?
Which of the following does the user want to implement?
A user has decided that they do not want an internal LAN segment to use public IP addresses. The user wants to translate them as private IP addresses to a pool of public IP addresses to identify them on the Internet. Which of the following does the user want to implement?
Which of the following should be implemented on the network to isolate these public hosts from the rest of the
A company wants to host public servers on a new network. These servers will include a website and mail server. Which of the following should be implemented on the network to isolate these public hosts from the rest of the network?
Which of the following is this an example of?
A user is redirected to a different website when the user requests the DNS record www.xyz.comptia. com. Which of the following is this an example of?
Which of the following could be implemented?
An administrator in a small office environment has implemented an IDS on the network perimeter to detect malicious traffic patterns. The administrator still has a concern about traffic inside the network originating between client workstations. Which of the following could be implemented?