Which of the following combinations is BEST to meet the requirements?
A company has several conference rooms with wired network jacks that are used by both employees and
guests. Employees need access to internal resources and guests only need access to the Internet. Which
of the following combinations is BEST to meet the requirements?
How could this BEST be accomplished?
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor,
and does not want this network to be routable to the firewall. How could this BEST be accomplished?
Which of the following cloud service options would support this requirement?
A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These
will need to still be reviewed on a regular basis to ensure the security of the company has not been
breached. Which of the following cloud service options would support this requirement?
Which of the following should Joe search for in the log files?
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of
a misconfigured router access list, allowing outside access to an SSH server. Which of the following should
Joe search for in the log files?
Which of the following methods would BEST accomplish this goal?
An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to combine the security controls of some of the network devices in the organization.
Which of the following methods would BEST accomplish this goal?
Which of the following methods would BEST accomplish this goal?
An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to integrate the security controls of some of the network devices in the
organization. Which of the following methods would BEST accomplish this goal?
Which of the following BEST describes this new network?
A security administrator is segregating all web-facing server traffic from the internal network and
restricting it to a single interface on a firewall. Which of the following BEST describes this new network?
Which of the following devices would MOST likely have a DMZ interface?
Which of the following devices would MOST likely have a DMZ interface?
Which of the following network design elements would MOST likely be recommended?
A security analyst needs to ensure all external traffic is able to access the company’s front-end servers but
protect all access to internal resources. Which of the following network design elements would MOST
likely be recommended?
Which of the following network architecture concepts is used to securely isolate at the boundary between netwo
Which of the following network architecture concepts is used to securely isolate at the boundary
between networks?