Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Which of the following network devices converts wireless signals to electronic signals?

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

A.

Physical

B.

Network

C.

Session

D.

Transport

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place