Which of the following network protocols would be used to transmit traps across a network to a log server?
Which of the following network protocols would be used to transmit traps across a network to a log
server?
Which of the following would be used as the encryption method?
A home user wishes to secure the wireless network using strong encryption, so they decide to use
AES. Which of the following would be used as the encryption method?
Which of the following security protocols would BEST protect a connection to a remote email server and ensure
Which of the following security protocols would BEST protect a connection to a remote email
server and ensure full integrity of all transmitted email communication?
Which of the following is an advantage of dynamic routing?
Which of the following is an advantage of dynamic routing?
Which of the following is the FIRST step in preventing spam that is originating from bots on the network?
A network administrator is tasked with blocking unwanted spam which is being relayed by an
internal email server. Which of the following is the FIRST step in preventing spam that is
originating from bots on the network?
Which of the following would BEST allow the technician to comply with the request?
A technician is asked to filter inbound and outbound traffic of a specific service on the network.
Which of the following would BEST allow the technician to comply with the request?
203.50.5.0 is an example of which of the following network classes?
203.50.5.0 is an example of which of the following network classes?
Which of the following port numbers needs to be open on a firewall to allow FTP traffic?
Which of the following port numbers needs to be open on a firewall to allow FTP traffic?
Which of the following methods uses this process?
A user enters a password into a logon box on a PC. The server and the PC then compare oneway hashes to validate the password. Which of the following methods uses this process?
Which of the following attacks has just occurred?
A user receives a phone call at home from someone claiming to be from their company’s IT help
desk. The help desk person wants to verify their username and password to ensure that the user’s
account has not been compromised. Which of the following attacks has just occurred?