Which of the following design elements would be implemented to comply with the security administrator’s requ
When designing a new network infrastructure, a security administrator requests that the intranet
web server be placed in an isolated area of the network for security purposes. Which of the
following design elements would be implemented to comply with the security administrator’s
request?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
Which of the following would allow the organization to divide a Class C IP address range into
several ranges?
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224?
Which of the following IP addresses would be hosts on the same subnet given the subnet mask
255.255.255.224? (Select TWO).
Which of the following would the security engineer set as the subnet mask for the servers below to utilize hos
Which of the following would the security engineer set as the subnet mask for the servers below to
utilize host addresses on separate broadcast domains?
Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Which of the following is BEST used to break a group of IP addresses into smaller network
segments or blocks?
Which of the following should the company configure to protect the servers from the user devices?
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3
wireless BYOD users and 2 web servers without wireless access. Which of the following should
the company configure to protect the servers from the user devices? (Select TWO).
which all of the employees’ devices are connected?
A network engineer is setting up a network for a company. There is a BYOD policy for the
employees so that they can connect their laptops and mobile devices.
Which of the following technologies should be employed to separate the administrative network
from the network in which all of the employees’ devices are connected?
Which of the following should he do to segment that traffic from the other traffic?
Pete, a network administrator, is capturing packets on the network and notices that a large amount
of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment
that traffic from the other traffic?
Which of the following would provide the BEST logical separation of these three device types while still allow
An administrator connects VoIP phones to the same switch as the network PCs and printers.
Which of the following would provide the BEST logical separation of these three device types while
still allowing traffic between them via ACL?