A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies wouldBEST describe this setup?
To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?
A. Use tcpdump and parse the output file in a protocol analyzer.
B. Use an IP scanner and target the cloud WAN network addressing.
C. Run netstat in each cloud server and retrieve the running processes.
D. Use nmap and set the servers' public IPs as the targets.
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?
A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?
A. Zero Trust
B. Planned obsolescence
C. Time to live
Which of the following policies should be referenced when a user wants to access work email on a personal cell phone?
A. Offboarding policy
B. Acceptable use policy
C. BYOD policy
D. Remote access policy
After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?
A. Modify the device's MIB on the monitoring system.
B. Configure syslog to send events to the monitoring system.
C. Use port mirroring to redirect traffic to the monitoring system.
D. Deploy SMB to transfer data to the monitoring system.
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?
B. Data link
A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.)
B. Speed mismatch
C. QoS misconfiguration
D. Protocol mismatch
E. CRC errors
F. Encapsulation errors
Which of the following VPN configurations should be used to separate Internet and corporate traffic?
B. Remote desktop gateway
D. Out-of-band management
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?
A. A media converter
B. A bridge
C. An MDIX
D. A load balancer