Which of the following ports should be opened on the firewall for remote server management?
A technician is unable to manage a remote server. Which of the following ports should be opened
on the firewall for remote server management? (Select TWO).
Which of the following network design elements allows for many internal devices to share one public IP address
Which of the following network design elements allows for many internal devices to share one
public IP address?
Which of the following design elements would be implemented to comply with the security administrator’s req
When designing a new network infrastructure, a security administrator requests that the intranet
web server be placed in an isolated area of the network for security purposes. Which of the
following design elements would be implemented to comply with the security administrator’s
request?
Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be
configured in order to restrict access to peer-to-peer file sharing websites?
Which of the following would be used to stop unauthorized access?
At an organization, unauthorized users have been accessing network resources via unused
network wall jacks. Which of the following would be used to stop unauthorized access?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician
checks the router access list and sees that web, email, and secure shell are allowed. Which of the
following is blocking network printing?
Which of the following should Joe search for in the log files?
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a
result of a misconfigured router access list, allowing outside access to an SSH server. Which of
the following should Joe search for in the log files?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI
model?
Which of the following protocols would provide secure access?
A security analyst needs to logon to the console to perform maintenance on a remote server.
Which of the following protocols would provide secure access?
which of the following stages of the Incident Handling Response?
The network administrator has been tasked to rebuild a compromised web server. The
administrator is to remove the malware and install all the necessary updates and patches. This
represents which of the following stages of the Incident Handling Response?