Which of the following mitigation techniques is being applied?

During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to...

September 3, 2022 No Comments READ MORE +

Which of the following describes how the network administrator can resolve this issue?

A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites . Which...

September 3, 2022 No Comments READ MORE +

Which of the following should the technician review on the switch to locate the device’s network port?

A technician is searching for a device that is connected to the network and has the device’s physical network address . Which of the following should the technician review on the switch to locate the device’s network port?A . IP route tableB . VLAN tagC . MAC tableD . QoS...

September 3, 2022 No Comments READ MORE +

Which of the following access methods would provide the BEST security for this new datacenter?

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection . Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computingB . Secure Socket ShellC ....

September 3, 2022 No Comments READ MORE +

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposesB . A duplication of a hosted virtual server to another physical server for redundancyC . A download of navigation data to...

September 2, 2022 No Comments READ MORE +

Which of the following TCP ports is used by the Windows OS for file sharing?

Which of the following TCP ports is used by the Windows OS for file sharing?A . 53B . 389C . 445D . 1433View AnswerAnswer: C

September 2, 2022 No Comments READ MORE +

At which of the following OSI model layers would a technician find an IP header?

At which of the following OSI model layers would a technician find an IP header?A . Layer 1B . Layer 2C . Layer 3D . Layer 4View AnswerAnswer: C

September 2, 2022 No Comments READ MORE +

Which of the following systems would MOST likely be found in a screened subnet?

Which of the following systems would MOST likely be found in a screened subnet?A . RADIUSB . FTPC . SQLD . LDAPView AnswerAnswer: B

September 2, 2022 No Comments READ MORE +

Which of the following will MOST likely replace all the company’s hubs?

A network administrator is implementing OSPF on all of a company’s network devices . Which of the following will MOST likely replace all the company’s hubs?A . A Layer 3 switchB . A proxy serverC . A NGFWD . A WLAN controllerView AnswerAnswer: A

September 2, 2022 No Comments READ MORE +

Which of the following is the LARGEST MTU for a standard Ethernet frame?

Which of the following is the LARGEST MTU for a standard Ethernet frame?A . 1452B . 1492C . 1500D . 2304View AnswerAnswer: C

September 2, 2022 No Comments READ MORE +