Which of the following security appliances would be used to only analyze traffic and send alerts when predefin
Which of the following security appliances would be used to only analyze traffic and send alerts
when predefined patterns of unauthorized traffic are detected on the network?
Which of the following would the administrator use to accomplish this?
An administrator would like to provide outside access to the company web server and separate the
traffic from the local network. Which of the following would the administrator use to accomplish
this?
Which of the following remote access protocols is commonly used for command line access to a device?
Which of the following remote access protocols is commonly used for command line access to a
device?
Which of the following would the administrator implement on the firewall to accomplish this?
An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP
access to server3 using a single outside IP address. Which of the following would the
administrator implement on the firewall to accomplish this?
Which of the following tools would the administrator MOST likely use?
An administrator would like to scan for open ports on the subnet and determine if any vulnerable
applications are listening. Which of the following tools would the administrator MOST likely use?
Which of the following protocols can be used?
A technician wants to send management information from devices on the network to a central
server and have it encrypted in the process. Which of the following protocols can be used?
An attack used to find unencrypted information in network traffic is called:
An attack used to find unencrypted information in network traffic is called:
which of the following should the administrator configure?
An administrator would like to block all HTTP traffic and allow all HTTPS traffic on the firewall.
Using the default port numbers, which of the following should the administrator configure? (Select
TWO).
Which of the following would be considered a Class C private address?
Which of the following would be considered a Class C private address?
Which of the following protocols would be MOST likely found to be running on a device in a SOHO environment?
Which of the following protocols would be MOST likely found to be running on a device in a SOHO
environment?