Term
QUESTION NO: 2 Which of the following logical access control methods would a security administrator need to modify in order to control network traffic passing through a router to a different network? A. Configuring VLAN 1 B. ACL C. Logical tokens D. Role-based access control changes |
|
Definition
|
|
Term
QUESTION NO: 3 Which of the following tools limits external access to the network? A. IDS B. VLAN C. Firewall D. DMZ |
|
Definition
|
|
Term
QUESTION NO: 4 Which of the following tools was created for the primary purpose of reporting the services that are open for connection on a networked workstation? A. Protocol analyzer B. Port scanner C. Password crackers D. Vulnerability scanner |
|
Definition
|
|
Term
QUESTION NO: 5 Which of the following is MOST likely to be an issue when turning on all auditing functions within a system? A. Flooding the network with all of the log information B. Lack of support for standardized log review tools C. Too much information to review D. Too many available log aggregation tools |
|
Definition
|
|
Term
QUESTION NO: 6 Upon opening the browser, a guest user is redirected to the company portal and asked to agree to the acceptable use policy. Which of the following is MOST likely causing this to appear? A. NAT B. NAC C. VLAN D. DMZ
|
|
Definition
|
|