1. Question
Actioned
Item completed: 02/25/2022 10:09 AM
Value: 1
Answer: DHCP Snooping
PASS
2. Question
Actioned
Item completed: 02/25/2022 10:09 AM
Value: 1
Answer: Create Private VLANs
PASS
3. Question
Actioned
Item completed: 02/25/2022 10:09 AM
Value: 1
Answer: Move the ports from the default VLAN to a new, unused VLAN and then disable them
PASS
4. Question
Actioned
Item completed: 02/25/2022 10:09 AM
Value: 1
Answer:
SNMPv1
SNMPv2c
SNMPv1
SNMPv2c
PASS
5. Question
Actioned
Item completed: 02/25/2022 10:09 AM
Value: 1
Answer: Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement
PASS
Score : 5 out of 5 (100%)
5. Question
Actioned
Item completed: 02/25/2022 10:10 AM
Value: 1
Answer: Check the IP routing table
PASS
6. Question
Actioned
Item completed: 02/25/2022 10:10 AM
Value: 1
Answer: VLAN assignment
PASS
7. Question
Actioned
Item completed: 02/25/2022 10:10 AM
Value: 1
Answer: Broadcast storm
PASS
8. Question
Actioned
Item completed: 02/25/2022 10:10 AM
Value: 1
Answer: Windows firewall is enabled, and port 8443 is not allowing traffic
PASS
9. Question
Actioned
Item completed: 02/25/2022 10:10 AM
Value: 1
Answer: traceroute
PASS
Score : 5 out of 5 (100%)
At what layer of the OSI model do proxy servers operate?
Hide Feedback
Correct
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
Hide Feedback
Correct
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Hide Feedback
Correct
What information in a transmitted message might an IDS use to identify network threats?
Hide Feedback
Correct
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Hide Feedback
Correct
Who is responsible for the security of hardware on which a public cloud runs?
Hide Feedback
Correct
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Hide Feedback
Correct
Which device would allow an attacker to make network clients use an illegitimate default gateway?
Hide Feedback
Correct
Which policy ensures messages are discarded when they don't match a specific firewall rule?
Hide Feedback
Correct
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
Hide Feedback
Correct
Comments
Post a Comment