Which of the following access controls enforces permissions based on data labeling at specific levels?

Which of the following access controls enforces permissions based on data labeling at specific levels?A . Mandatory access controlB . Separation of duties access controlC . Discretionary access controlD . Role based access controlView AnswerAnswer: A

September 10, 2018 No Comments READ MORE +

A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?

A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely...

September 9, 2018 No Comments READ MORE +

Which of the following should the technician check?

A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?A . The arp table of the new customer's router.B . The route table of the next-hop router.C . The route table of the new customer's router.D ....

September 9, 2018 No Comments READ MORE +

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?A . Decreased performance of internal networkB . Loss of full control over data resourcesC . Increased malware exposureD . Incompatibility with the current networkView AnswerAnswer: B

September 9, 2018 No Comments READ MORE +

Which of the following layers of the OSI model is between the Data Link and Transport layers?

Which of the following layers of the OSI model is between the Data Link and Transport layers?A . ApplicationB . SessionC . NetworkD . PhysicalView AnswerAnswer: C

September 7, 2018 No Comments READ MORE +

Which of the following describes a DNS server?

Which of the following describes a DNS server?A . Translates an IP address to a nameB . Caches commonly viewed web pagesC . Assigns IP addresses to network devicesD . Provides port security for a networkView AnswerAnswer: A

September 6, 2018 No Comments READ MORE +

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?A . 255.255.255.0B . 255 255.255.128C . 255.255.255.192D . 255.255.255.248View AnswerAnswer: A

September 6, 2018 No Comments READ MORE +

Which of the following devices can be used to offload outbound web server SSL encryption overhead?

Which of the following devices can be used to offload outbound web server SSL encryption overhead?A . NIPSB . Proxy serverC . Content filterD . VPN connectatorView AnswerAnswer: B

September 5, 2018 No Comments READ MORE +

Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity

HOTSPOT Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity. Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select the Done button. View AnswerAnswer: All ports should...

September 3, 2018 2 Comments READ MORE +

Which of the following should be implemented to aide in this matter?

A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?A . VPNB . Throughput testerC . FirewallD . OC3View AnswerAnswer: C

September 3, 2018 No Comments READ MORE +