Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network
A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?
Which of the following is the correct firewall rule?
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with
the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?
Which of the following can be configured on a managed network switch to send real time alerts to a technician?
Which of the following can be configured on a managed network switch to send real time alerts to
a technician?
Which of the following should be mitigated by employing proper coding techniques when developing software?
Which of the following should be mitigated by employing proper coding techniques when
developing software?
Which method is the BEST way to accomplish this?
A company is experiencing a denial of service attack and wants to identify the source IP address
of the attacker in real time. Which method is the BEST way to accomplish this?
Which of the following devices would enable the owner to meet these requirements?
A small business owner is in the process of setting up a SOHO office. The office has only one
connection to the Internet via a broadband cable connection. The office has four subnets that must
be able to connect to the Internet. Which of the following devices would enable the owner to meet
these requirements?
Which of the following would a network administrator deploy to implement these requirements?
A company needs to implement a secure wireless system that would require employees to
authenticate to the wireless network with their domain username and password. Which of the
following would a network administrator deploy to implement these requirements? (Select TWO).
Which of the following threats did the network technician find?
A network technician is doing a wireless audit and finds an SSID that does not match the
company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is
Default. Which of the following threats did the network technician find?
Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF?
Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF?
Which of the following tools would MOST likely accomplish this?
An administrator would like to search for network vulnerabilities on servers, routers, and
embedded appliances. Which of the following tools would MOST likely accomplish this?