Within the realm of network security, Zero Trust:

Within the realm of network security, Zero Trust:A . prevents attackers from moving laterally through a system. B. allows a server to communicate with outside networks without a firewall. C. block malicious software that is too new to be found in virus definitions. D. stops infected files from being downloaded...

February 5, 2023 No Comments READ MORE +

Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...

February 5, 2023 No Comments READ MORE +

Which of the following would address this issue by allowing the use of the original cable?

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?A . CSMA/CD...

February 5, 2023 No Comments READ MORE +

Which of the following software tools would BEST assist the technician in completing this task?

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?A . IP scanner B. Terminal emulator C. NetFlow analyzer D. Port scannerView AnswerAnswer: A

February 5, 2023 No Comments READ MORE +

Which of the following ports is commonly used by VoIP phones?

Which of the following ports is commonly used by VoIP phones?A . 20 B. 143 C. 445 D. 5060View AnswerAnswer: D

February 4, 2023 No Comments READ MORE +

Which of the following concepts should the company select?

A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select?A...

February 4, 2023 No Comments READ MORE +

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSO B. TACACS+ C. Zero Trust D. Separation of duties E. Multifactor authenticationView AnswerAnswer: B

February 4, 2023 No Comments READ MORE +

Which of the following would be BEST for the technician to use to perform this task?

A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?A . RDP B. SSH C. FTP D. DNSView AnswerAnswer: A

February 4, 2023 No Comments READ MORE +

Which of the following technologies BEST meets the organization’s requirements?

An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?A . Load balancing B. Geofencing C. Public cloud D. Content delivery network E. Infrastructure as a serviceView AnswerAnswer: D

February 4, 2023 No Comments READ MORE +

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switch B. VPN headend C. Next-generation firewall D. Proxy server E. Intrusion preventionView AnswerAnswer: C

February 4, 2023 No Comments READ MORE +