which of the following OSI layers?
The TCP/IP application layer contains which of the following OSI layers?
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all i
Which of the following performs authentication and provides a secure connection by using 3DES
to encrypt all information between two systems?
Which of the following would need to be configured to prevent any further attacks from that IP address?
Several users are reporting connectivity issues with their laptops. Upon further investigation, the
network technician identifies that their laptops have been attacked from a specific IP address
outside of the network. Which of the following would need to be configured to prevent any further
attacks from that IP address?
Which of the following is MOST commonly implemented for remote access to UNIX systems?
Which of the following is MOST commonly implemented for remote access to UNIX systems?
Which of the following would MOST likely be configured on the firewall?
The company is setting up a new website that will be requiring a lot of interaction with external
users. The website needs to be accessible both externally and internally but without allowing
access to internal resources. Which of the following would MOST likely be configured on the
firewall?
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server fro
Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?
which of the following protocols?
Using source port numbers as a way to keep track of connections is a characteristic of which of
the following protocols?
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subn
Which of the following would be used to check whether a DoS attack is taking place from a
specific remote subnet?
Which of the following tools would appropriately diagnose the problem?
An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is
suspected. Which of the following tools would appropriately diagnose the problem?
Which of the following network devices builds a table of ports to MAC addresses to forward packets only to nec
Which of the following network devices builds a table of ports to MAC addresses to forward
packets only to necessary ports?