QUESTION
NO: 1
Which
of the following logical access control methods would a security administrator
need to modify in order to control network traffic passing through a router to
a different network?
A.
Configuring VLAN 1
B.
ACL
C.
Logical tokens
D.
Role-based access control changes
Answer:
B
QUESTION
NO: 2
Which
of the following tools limits external access to the network?
A.
IDS
B.
VLAN
C.
Firewall
D.
DMZ
Answer:
C
QUESTION
NO: 3
Which
of the following tools was created for the primary purpose of reporting the
services that are open for connection on a networked workstation?
A.
Protocol analyzer
B.
Port scanner
C.
Password crackers
D.
Vulnerability scanner
Answer:
B
QUESTION
NO: 4
Which
of the following is MOST likely to be an issue when turning on all auditing
functions within a system?
A.
Flooding the network with all of the log information
B.
Lack of support for standardized log review tools
C.
Too much information to review
D.
Too many available log aggregation tools
Answer:
C
QUESTION
NO: 5
Upon
opening the browser, a guest user is redirected to the company portal and asked
to agree to the acceptable use policy. Which of the following is MOST likely
causing this to appear?
A.
NAT
B.
NAC
C.
VLAN
D.
DMZ
Answer:
B
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home