A company’s IT security engineer has noticed several employe…
A company’s IT security engineer has noticed several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click a link to view a video, she stops the worker. Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about?
Read DetailsBryanna is a network engineer. She is devising a plan to hel…
Bryanna is a network engineer. She is devising a plan to help her company’s infrastructure transition from IPv4 to IPv6 addressing. She selects a solution where both IPv4 and IPv6 protocol stacks coexist in the same network equipment, allowing network communication using both protocols. Which solution did she choose?
Read DetailsA company’s IT security engineer has noticed several employe…
A company’s IT security engineer has noticed several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click a link to view a video, she stops the worker. Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about?
Read DetailsFelicia is a network engineer deploying a virtual private ne…
Felicia is a network engineer deploying a virtual private network (VPN) solution. The VPN operates using Secure Shell (SSH). When asked by a new help desk tech about which layer of the OSI model it employs, how does Felicia answer?
Read DetailsYou are setting up a small home network. You want all device…
You are setting up a small home network. You want all devices to communicate with each other. You assign IPv4 addresses between 10.10.10.1 and 10.10.10.8 to the devices. What processes must still be configured so that these nodes can communicate with the Internet?
Read DetailsJohn is a network engineer for Virginia Community College Sy…
John is a network engineer for Virginia Community College System (VCCS). The chief information officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes per year to 30 seconds per year. The change should occur over the next 6 months. Which security objective must John employ to accomplish this goal?
Read Details