Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?A . Decreased performance of internal networkB . Loss of full control over data resourcesC . Increased malware exposureD . Incompatibility with the current networkView AnswerAnswer: B

October 21, 2020 No Comments READ MORE +

Which of the following should the IT staff reference to determine the location of the equipment being moved?

A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved?A ....

October 21, 2020 No Comments READ MORE +

When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity?

A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)A . TCP 25B . TCP 110C . TCP 143D . TCP 389E . TCP 587F . TCP...

October 21, 2020 No Comments READ MORE +

Which of the following should be implemented?

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A

October 21, 2020 No Comments READ MORE +

Which of the following devices needs to be installed between the switches to allow communication?

A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?A . BridgeB . Access pointC ....

October 21, 2020 No Comments READ MORE +

Which of the following would allow SSH to function properly?

A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?A . Perform file hashingB . Generate...

October 21, 2020 No Comments READ MORE +

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A

October 21, 2020 No Comments READ MORE +

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)A . VPN concentratorB . Proxy serverC . Wireless controllerD . RADIUS serverE . Multilayer switchView AnswerAnswer: CD

October 21, 2020 No Comments READ MORE +

Which of the following concepts would BEST ensure this requirement?

A network administrator is setting up a web-based application that needs to be continually accessible to the end users. Which of the following concepts would BEST ensure this requirement?A . High availabilityB . SnapshotsC . NIC teamingD . Cold siteView AnswerAnswer: A

October 20, 2020 No Comments READ MORE +

Considering this, which of the following is the BEST way for the company to connect these networks?

In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company b uses the following scheme: Subnet 1: 192.168.1.50/28 The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the...

October 20, 2020 No Comments READ MORE +