1.
The purpose of a DMZ is to add an additional layer of security to an organization's Local Area Network (LAN); an external attacker only has access to equipment in the DMZ, rather than the whole of the network. DMZ can be created by which network device?
2.
Refer to the following routing protocols, which one uses the next hop metric to determine the way of traffic routing?
3.
In a network, multiple nodes can be connected by which layer2 device?
4.
Both the T-568A and the T-568B standard Straight-Through cables are used most often as patch cords for your Ethernet connections. Which item below will use 568B standard?
5.
The blocked port can be found in which of the following documentations?
6.
A rogue WAP can be found in which of the following documentation?
7.
Which wireless security protocol below is able to support the highest encryption standards?
8.
Which protocol belongs to the OSI transport layer and has the best-effort delivery method?
9.
Which statement best describes the objective of a DMZ?
10.
Which tool can discover the unencrypted passwords sent over the network?