How could he access the server using RDP on a port othe…
A server administrator needs to administer a server remotely using RDP, but the specified port is closed on the outbound firewall on the network. How could he
access the server using RDP on a port other than the typical registered port for the RDP protocol?
Which of the following options will provide the best pe…
A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone service and are concerned about their existing data network
interfering with the VoIP phone system. The core switches in the existing data network are almost fully saturated. Which of the following options will provide the best
performance and availability for both the VoIP traffic, as well as the traffic on the existing data network?
Which of the following would assist the administrator i…
A security administrator suspects that data on a server has been exfiltrated as a result of unauthorized remote access. Which of the following would assist the
administrator in confirming the suspicions? (Select TWO)
Which of the following security measures can the admini…
The security administrator has noticed cars parking just outside of the building fence line. Which of the following security measures can the administrator use to
help protect the company’s WiFi network against war driving? (Select TWO)
Which of the following should the technician use to vie…
A network technician is trying to determine the source of an ongoing network based attack. Which of the following should the technician use to view IPv4 packet
data on a particular internal network segment?
Which of the following allows an application to securel…
Which of the following allows an application to securely authenticate a user by receiving credentials from a web domain?
Which of the following describes the encrypted data?
The administrator installs database software to encrypt each field as it is written to disk. Which of the following describes the encrypted data?
which of the following is the MOST appropriate hashing …
When generating a request for a new x.509 certificate for securing a website, which of the following is the MOST appropriate hashing algorithm?
Which of the following BEST describes the assessment th…
During a recent audit, it was discovered that many services and desktops were missing security patches. Which of the following BEST describes the assessment
that was performed to discover this issue?
Which of the following security-related training could …
Ann, a college professor, was recently reprimanded for posting disparaging remarks regarding her coworkers on a web site. Ann stated that she was not aware that
the public was able to view her remakes. Which of the following security-related training could have made Ann aware of the repercussions of her actions?