Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switchB . VPN headendC . Next-generation firewallD . Proxy serverE . Intrusion preventionView AnswerAnswer: C

September 1, 2022 No Comments READ MORE +

With which of the following concepts is this technique MOST closely associated?

A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?A . Insider threatB . War drivingC . Evil twinD . HoneypotView AnswerAnswer: D

September 1, 2022 No Comments READ MORE +

Which of the following disaster recovery solutions should the corporation implement?

A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline . Which of the following disaster recovery solutions should the corporation implement?A . Full backupsB . Load balancingC . Hot siteD . SnapshotsView AnswerAnswer: C

September 1, 2022 No Comments READ MORE +

Which of the following should a network security administrator recommend to assist with detecting these activities?

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems . Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring.B . Change the default...

September 1, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: - The SSIDs need to be configured as CorpNet with a key of S3cr3t! -...

September 1, 2022 No Comments READ MORE +

Which of the following would MOST likely be used to review previous upgrades to a system?

Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity planB . Change managementC . System life cycleD . Standard operating proceduresView AnswerAnswer: B

September 1, 2022 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex . Which of the following is the MOST likely cause of this issue?A . The link is improperly terminatedB . One of the...

September 1, 2022 No Comments READ MORE +

Which of the following commands should the technician run?

A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers . Which of the following commands should the technician run?A . ipconfigB . nslookupC . arpD . routeView AnswerAnswer: B

August 31, 2022 No Comments READ MORE +

Which of the following documents would BEST support this?

The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained . Which of the following documents would BEST support this?A . An incident response planB . A business continuity planC . A change management policyD . An acceptable use policyView...

August 31, 2022 No Comments READ MORE +

Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?

Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?A . A media converterB . A bridgeC . An MDIXD . A load balancerView AnswerAnswer: A

August 31, 2022 No Comments READ MORE +