1.
A technician is responsible for configuring a new firewall. The hardware team has already installed, powered, and connected the system. Which of the following types of documentation should the technician utilize to complete the task?
2.
Which of the following storage network technologies inherently leverages block-level storage?
3.
A disgruntled employee decides to leak critical information about a company's new product. The employee places keyloggers on the department's computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring?
4.
A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?
5.
Which of the following DNS record types is an alias?
6.
A technician is utilizing SNMPv3 to monitor network statistics. Which of the following actions would occur immediately of a server's utilization spikes above the prescribed value?
7.
802.11n clients currently have no way to connect to the network. Which of the following devices should be implemented to let the clients connect?
8.
A Chief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the company's network devices. Which of the following is the MOST secure way to prevent this?
9.
The Chief Executive Officer's (CEO's) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?
10.
A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be specifically configured to allow VPN traffic into the network?