1.
Which of the following network security devices is the BEST to use when increasing the security of an entire network, or network segment, by preventing the transmission of malicious packets from known attacking sources?
2.
A company sets up wireless access points for visitors to use wireless devices. Which of the following encryption methods should they implement to provide the highest level of security?
3.
In the past several weeks, there have been an increased amount of failed remote desktop login attempts from an external IP address. Which of the following ports should the administrator change from its default to control this?
4.
If an administrator wanted to be able to identify exactly which Internet sites are being accessed most frequently, which of the following tools would MOST likely be used?
5.
The network administrator has been tasked with creating a VPN connection to a vendors site. The vendor is using older equipment that does not support AES. Which of the following would be the network administrators BEST option for configuring this link?
6.
Which of the following might be referenced to determine if a server is functioning abnormally?
7.
A SQL database MOST likely implements which of the following access security mechanisms?
8.
The IPSec authentication header provides which of the following?
9.
In evaluating risk assessments, senior level managers would MOST likely accept a risk based on which of the following reasons?
10.
A web server that the employees use to fill out their time cards needs to be protected. The web server needs to be accessible to employees both inside the campus and at remote sites. Some of the employees use computers that do not belong to the company to do their work. Which of the following would BEST protect the server?