Michael decides to view the-----------------to track employee actions on the organization's network.
Michael decides to view the-----------------to track employee actions on the organization's network.A . Firewall policyB . Firewall logC . Firewall settingsD . Firewall rule setView AnswerAnswer: B
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.A . SANB . SCSAC . NASD . SASView AnswerAnswer: A
Which IEEE standard does wireless network use?
Which IEEE standard does wireless network use?A . 802.11B . 802.18C . 802.9D . 802.10View AnswerAnswer: A
What command will he use to check all the remote addresses and ports in numerical form?
Alex is administrating the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?A . Netstat -oB . Netstat -aC . Netstat -aoD . Netstat -anView AnswerAnswer: D
Which command will John use to enable NetFlow on an interface?
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?A . Router(Config-if) # IP route - cache flowB . Router# Netmon enableC...
What type of solution does Fred's boss want to implement?
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require...
What type of scan is Cindy attempting here?
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her...
Which of the following is a best practice for wireless network security?
Which of the following is a best practice for wireless network security?A . Enabling the remote router loginB . Do not changing the default SSIDC . Do not placing packet filter between the AP and the corporate intranetD . Using SSID cloakingView AnswerAnswer: D
Which backup method will he select?
Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?A . Normal backupB . Warm backupC . Hot backupD . Cold backupView AnswerAnswer: C
Which ISO standard will management decide to implement?
Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?A . ISO/IEC 27004B . ISO/IEC 27002C . ISO/IEC 27006D . ISO/IEC 27005View AnswerAnswer: D