A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network access.
Enableevent logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
When planning a new network, the administrator is interested in a physical topology that is used more often than any other. Which topology is the administrator considering?
A company wants toconfigure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
stateful packet inspection
stateless packet inspection
As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Whichbackup type takes the greatest amount of time and is commonly used in conjunction with another backup method?
Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the first line of the tracert command output displayed in the exhibit?
defaultgateway for the local computer
default gateway for the ISP
IP address on the local computer
IP address for the desired site
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
7After adding several refurbished computers to the network, the network administrator receives complaints from the users that their connection to the network is too slow. The administrator finds that the computers are connected to 100 Mbps switch ports but are accessing the network at only 10 Mbps. What could be the problem?
The computers have NICs that are integrated into the motherboard.
Thecomputers are running Windows 2000.
The computers are configured to use a VPN.
The computers have NICs that support only 10 Mbps.
A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?
Which protocolprovides secure transport of data from the company web server to remote users?
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
Computers on a corporate network perform well without automatic updates because they are protected by a firewall.
Home users should avoid automatic updates becausethey are protected by Windows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.
Which simple wireless configuration technique can make the network invisible to unauthorizedusers?
Change the default password on the WAP.
Disable inactive wireless connections.
Filter all network access using MAC addresses.
Disable SSID broadcasting.
Which two hazards exist when working with fiber optic cabling? (Choose two.)
A technician has been asked to format the...
Leer documento completo
Regístrate para leer el documento completo.