Which of the following will secure traffic between a we…
A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure
traffic between a web browser and a website?
Which of the following should be implemented to securel…
A technician wants to securely manage several remote network devices. Which of the following should be
implemented to securely manage the devices?
Which of the following would need to be configured on e…
A network technician has been tasked to configure a new network monitoring tool that will examine interface
settings throughout various network devices. Which of the following would need to be configured on each
network device to provide that information in a secure manner?
Which of the following would be the result of a user ph…
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into
another interface with switch port security enabled as the default setting?
Which of the following actions should the IT security t…
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their
work computers. Which of the following actions should the IT security team implement to help protect the
network from attack as a result of this new policy?
Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency
emanations. Which of the following standards should be consulted?
Which of the following is the BEST explanation that des…
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response
from the server. Which of the following is the BEST explanation that describes this scenario?
which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an
example of which of the following attacks?
Which of the following attacks is the user MOST likely …
A malicious user floods a switch with frames hoping to redirect traffic to the user’s server. Which of the
following attacks is the user MOST likely using?
Which of the following describes a smurf attack?
Which of the following describes a smurf attack?