John has implemented ________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.
John has implemented ________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.A . DMZB . ProxiesC . VPND . NATView AnswerAnswer: D Explanation: Network Address Translation (NAT) is a network function that translates private IP addresses into...
What is the last step he should list?
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?A . Assign eradication.B . RecoveryC . ContainmentD . A follow-up.View AnswerAnswer:...
Which of the following factors will the administrator consider when deciding on the appropriate backup medium?
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium?A . Capability B. Accountability C. Extensibility D. ReliabilityView AnswerAnswer: A,C,D
What does this source address signify?
Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?A . This address means that the source is using an IPv6...
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?A . Application sandboxing B. Deployment of WAFS C. Application whitelisting D. Application blacklistingView AnswerAnswer: A
Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?
John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?A ....
What is the first step they should do to create the network vulnerability assessment plan?
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how...
-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)
-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)A . 802.15.4 B. 802.15 C. 802.12 D. 802.16View AnswerAnswer: D
What IP address class is the network range a part of?
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?A . Class C B. Class A C. Class B D. Class DView AnswerAnswer: B
What are the other f unction(s) of the device?
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)A . Provides access memory, achieving high efficiency B. Assigns user addresses C. Enables input/output (I/O) operations D. Manages security keysView AnswerAnswer: B,C,D