Which of the following are common reasons for implementing port security on the firewall?
A customer wants to increase firewall security. Which of the following are common reasons for
implementing port security on the firewall? (Select TWO).
Which of the following troubleshooting steps should the technician take NEXT?
A network technician has determined a managed network switch has failed. The technician knows
how to install a new switch, but not how to properly configure it. Which of the following
troubleshooting steps should the technician take NEXT?
The security measure used to reduce vulnerabilities for MOST network devices that require regular application
The security measure used to reduce vulnerabilities for MOST network devices that require
regular application and monitoring is:
Which of the following appliances creates and manages a large number of secure remote-access sessions, and als
Which of the following appliances creates and manages a large number of secure remote-access
sessions, and also provides a high availability solution?
Which of the following is the BEST option for connectivity?
A company has one public IP address, and only one device needs to be able to connect to the
Internet at a time. Which of the following is the BEST option for connectivity?
Which of the following network access security methods ensures communication occurs over a secured, encrypted
Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
Which of the following technologies would be used?
A network administrator is responding to a statement of direction made by senior management to
implement network protection that will inspect packets as they enter the network. Which of the
following technologies would be used?
Which of the following protocols does DNS utilize on port 53?
Which of the following protocols does DNS utilize on port 53?
Which of the following would BEST provide this functionality?
A network administrator is looking to implement a solution allowing users to utilize a common
password to access most network resources for an organization. Which of the following would
BEST provide this functionality?
which of the following security features for controlling access?
A strong network firewall would likely support which of the following security features for controlling
access? (Select TWO).