A company security policy requires all network traffic from remote employees ' corporate laptops to use the company’s VPN. Which of the following network access methods best describes this scenario?
Which of the following would describe a data recovery goal?
Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?
A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?
Which of the following are the best device-hardening techniques for network security? (Select two).
Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?
A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?
A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the following can the administrator use to complete this task?
Which of the following is most closely associated with having a leased line to a public cloud provider?
Which of the following OSI model layers can utilize a connectionless protocol for data transmission?
Which of the following network cables involves bounding light off of protective cladding?
Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?
Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?
An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?
A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?