A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies wouldBEST describe this setup?
Question 122
To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?
Question 123
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?
Question 124
A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?
Question 125
Which of the following policies should be referenced when a user wants to access work email on a personal cell phone?
Question 126
After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?
Question 127
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?
Question 128
A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.)
Question 129
Which of the following VPN configurations should be used to separate Internet and corporate traffic?
Question 130
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?