which of the following layers do IP addresses exist?
At which of the following layers do IP addresses exist?
Which of the following solutions provides the MOST security from third party tampering?
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A
network administrator is assigned to provide connectivity between the existing office and the new
office. Which of the following solutions provides the MOST security from third party tampering?
which of the following layers of the OSI model does the problem MOST likely reside?
Users at a remote site are unable to establish a VPN to the main office. At which of the following
layers of the OSI model does the problem MOST likely reside?
Which two layers of the OSI model make up the TCP/IP model Network Interface layer?
Which two layers of the OSI model make up the TCP/IP model Network Interface layer?
Which of the following protocols needs to be denied?
A network technician is concerned that an attacker is attempting to penetrate the network, and
wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are
valid on the network. Which of the following protocols needs to be denied?
Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have
reported that they are unable to access Internet websites. The technician verifies this using the IP
address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connecti
Which of the following source ports is MOST likely to be used by a client when making an
outbound TCP connection to a windows server?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing t
Which of the following describes a single computer that is setup specifically to lure hackers into
revealing their methods, and preventing real attacks on the production network?
Which of the following network appliances will only detect and not prevent malicious network activity?
Which of the following network appliances will only detect and not prevent malicious network
activity?
Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company ro
Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a
company router?