Which of the following provides redundancy ona file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
A.
NIC teaming
B.
Load balancer
C.
RAID array
D.
PDUs
NIC teaming
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?
A.
A network tap
B.
A proxy server
C.
A UTM appliance
D.
A content filter
A UTM appliance
A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?
A.
Full backups
B.
Load balancing
C.
Hot site
D.
Snapshots
Hot site
Which of the following TCP ports is used by the Windows OS for file sharing?
A.
53
B.
389
C.
445
D.
1433
445
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting
company notices remote printing is accomplished by port forwarding via publicly accessible
IPs through the firm's firewall Which of the following would be the MOST appropriate way
to enable secure remote printing?
A.
SSH
B.
VPN
C.
Telnet
D.
SSL
SSH
Page 10 out of 41 Pages |
Previous |