Which of the following is BEST used as a secure replacement for TELNET?
Which of the following is BEST used as a secure replacement for TELNET?
Which of the following protocols would provide secure access?
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of
the following protocols would provide secure access?
Which of the following protocols could be utilized?
A UNIX administrator would like to use native commands to provide a secure way of connecting to other
devices remotely and to securely transfer files. Which of the following protocols could be utilized? (Select
TWO).
which of the following should be powered on FIRST to establish DNS services?
A network technician is on the phone with the system administration team. Power to the server room
was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several
machines are powered off. Assuming each server only provides one service, which of the following should
be powered on FIRST to establish DNS services?
Which of the following BEST describes this type of record?
When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com.
Which of the following BEST describes this type of record?
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on
Which of the following should be implemented to stop an attacker from mapping out addresses and/or
devices on a network?
Which of the following protocol would be MOST appropriate?
A security engineer, Joe, has been asked to create a secure connection between his mail server and the
mail server of a business partner. Which of the following protocol would be MOST appropriate?
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following is being used?
An administrator configures all wireless access points to make use of a new network certificate authority.
Which of the following is being used?
which of the following protocols?
An achievement in providing worldwide Internet security was the signing of certificates associated with
which of the following protocols?