Which of the following would be Pete’s BEST option?
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the
downtime in the event of a disaster, but does not have the budget approval to implement or
maintain an offsite location that ensures 99.99% availability. Which of the following would be
Pete’s BEST option?
Which of the following has Jane MOST likely configured on the switch?
Jane, a network administrator, has configured a 48-port switch to isolate four different
departments. Which of the following has Jane MOST likely configured on the switch?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher
which will encrypt 8 bits at a time before sending the data across the network. Which of the
following has Sara selected?
what technologies should the authentication protocol be changed to?
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the
authenticator. Which of the following is configured in the RADIUS server and what technologies
should the authentication protocol be changed to?
Which of the following is an important implementation consideration when deploying a wireless network that use
Which of the following is an important implementation consideration when deploying a wireless
network that uses a shared password?
Which of the following would satisfy wireless network implementation requirements to use mutual authentication
Which of the following would satisfy wireless network implementation requirements to use mutual
authentication and usernames and passwords?
Which of the following network design elements would MOST likely be recommended?
A security analyst needs to ensure all external traffic is able to access the company’s front-end
servers but protect all access to internal resources. Which of the following network design
elements would MOST likely be recommended?
Layer 7 devices used to prevent specific types of html tags are called:
Layer 7 devices used to prevent specific types of html tags are called:
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based
on individual user characteristics and NOT on job function?
Which of the following network architecture concepts is used to securely isolate at the boundary between netwo
Which of the following network architecture concepts is used to securely isolate at the boundary
between networks?