Which of the following is designed to keep the HR department users from accessing the accounting department’
Pete, a security administrator, is informed that people from the HR department should not have access to
the accounting department’s server, and the accounting department should not have access to the HR
department’s server. The network is separated by switches. Which of the following is designed to keep
the HR department users from accessing the accounting department’s server and vice-versa?
Which of the following would be the simplest way to accomplish this?
According to company policy an administrator must logically keep the Human Resources department
separated from the Accounting department. Which of the following would be the simplest way to
accomplish this?
which of the following can be inferred about the above environment?
Review the following diagram depicting communication between PC1 and PC2 on each side of a router.
Analyze the network traffic logs which show communication between the two computers as captured by
the computer with IP 10.2.2.10.
DIAGRAM
PC1 PC2
[192.168.1.30]——–[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]———[10.2.2.10] LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK
Given the above information, which of the following can be inferred about the above environment?
The MOST effective way to mask the network address of the users would be by passing the traffic through a:
An administrator wishes to hide the network addresses of an internal network when connecting to the
Internet. The MOST effective way to mask the network address of the users would be by passing the
traffic through a:
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server. The following
ports appear in the log:
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
Which of the following is a programming interface that allows a remote computer to run programs on a local mac
Which of the following is a programming interface that allows a remote computer to run programs on a
local machine?
Which of the following would Pete, a security administrator, MOST likely implement…?
Which of the following would Pete, a security administrator, MOST likely implement in order to allow
employees to have secure remote access to certain internal network services such as file servers?
Which of the following should be performed to increase the availability of IP telephony by prioritizing traffi
Which of the following should be performed to increase the availability of IP telephony by prioritizing
traffic?
Which of the following is MOST likely causing this issue?
An auditor is given access to a conference room to conduct an analysis. When they connect their laptop’s
Ethernet cable into the wall jack, they are not able to get a connection to the Internet but have a link
light. Which of the following is MOST likely causing this issue?
Which of the following BEST describes this system type?
A computer is put into a restricted VLAN until the computer’s virus definitions are up-to-date.
Which of the following BEST describes this system type?