Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following access controls enforces permissions based on data labeling at specific levels?A . Mandatory access controlB . Separation of duties access controlC . Discretionary access controlD . Role based access controlView AnswerAnswer: A
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely...
Which of the following should the technician check?
A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?A . The arp table of the new customer's router.B . The route table of the next-hop router.C . The route table of the new customer's router.D ....
Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?
Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?A . Decreased performance of internal networkB . Loss of full control over data resourcesC . Increased malware exposureD . Incompatibility with the current networkView AnswerAnswer: B
Which of the following layers of the OSI model is between the Data Link and Transport layers?
Which of the following layers of the OSI model is between the Data Link and Transport layers?A . ApplicationB . SessionC . NetworkD . PhysicalView AnswerAnswer: C
Which of the following describes a DNS server?
Which of the following describes a DNS server?A . Translates an IP address to a nameB . Caches commonly viewed web pagesC . Assigns IP addresses to network devicesD . Provides port security for a networkView AnswerAnswer: A
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?A . 255.255.255.0B . 255 255.255.128C . 255.255.255.192D . 255.255.255.248View AnswerAnswer: A
Which of the following devices can be used to offload outbound web server SSL encryption overhead?
Which of the following devices can be used to offload outbound web server SSL encryption overhead?A . NIPSB . Proxy serverC . Content filterD . VPN connectatorView AnswerAnswer: B
Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity
HOTSPOT Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity. Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select the Done button. View AnswerAnswer: All ports should...
Which of the following should be implemented to aide in this matter?
A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?A . VPNB . Throughput testerC . FirewallD . OC3View AnswerAnswer: C