GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Felicia is a network engineer deploying a virtual private ne…

Felicia is a network engineer deploying a virtual private network (VPN) solution. The VPN operates using Secure Shell (SSH). When asked by a new help desk tech about which layer of the OSI model it employs, how does Felicia answer?

Read Details

A company uses an Internet Protocol Security (IPSec) virtual…

A company uses an Internet Protocol Security (IPSec) virtual private network (VPN) solution. It allows remote users to connect to the main office and allows communication between the main office and branch offices securely over the Internet. The main office network uses network address translation (NAT) with an internal IP address range of 192.168.0.1 to 192.168.0.254. Which of the following ranges must remote offices and users NOT use on their internal networks?

Read Details

Amy is a network engineering consultant. She is designing se…

Amy is a network engineering consultant. She is designing security for a small to medium-sized government contractor working on a project for the military. The government contractor’s network is comprised of 30 workstations plus a wireless printer, and it needs remote authentication. Which of the following is a type of authentication solution she should deploy?

Read Details

A drawback of multiple-vendor environments is the amount of…

A drawback of multiple-vendor environments is the amount of network staff training that is typically needed.

Read Details

An access control list (ACL) focuses on controlling a specif…

An access control list (ACL) focuses on controlling a specific user’s or client’s access to a protocol or port.

Read Details

A demilitarized zone (DMZ) is a boundary network that hosts…

A demilitarized zone (DMZ) is a boundary network that hosts resource servers for the public Internet.

Read Details

Depending on the firewall, a single rule can sometimes defin…

Depending on the firewall, a single rule can sometimes define outbound and inbound communication parameters.

Read Details

A company’s IT security engineer has noticed several employe…

A company’s IT security engineer has noticed several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click a link to view a video, she stops the worker. Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about?

Read Details

Bryanna is a network engineer. She is devising a plan to hel…

Bryanna is a network engineer. She is devising a plan to help her company’s infrastructure transition from IPv4 to IPv6 addressing. She selects a solution where both IPv4 and IPv6 protocol stacks coexist in the same network equipment, allowing network communication using both protocols. Which solution did she choose?

Read Details

A company’s IT security engineer has noticed several employe…

A company’s IT security engineer has noticed several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click a link to view a video, she stops the worker. Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about?

Read Details

Posts pagination

Newer posts 1 … 37,375 37,376 37,377 37,378 37,379 … 77,206 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top