How can a network admin harden hosts and network devices? Choose all correct
answers.
Lock all doors to IT assets
Remove default or out of the box passwords.
Remove all unnecessary logins
Keep patches up to date
Audit Access
Give this one a try later!
, Lock all doors to IT assets
Remove default or out of the box passwords.
Remove all unnecessary logins
Keep patches up to date
Audit Access
An administrator fails to configure protection for usernames and passwords
transmitted across the network. Which component of the AAA model is weakened?
a. Authentication
b. Authorization
c. Access
d. Availability
Give this one a try later!
a. Authentication
Which cloud feature is used to prevent data loss and provide for data retrieval in the
event of a disaster?
a. Data backups and archives
b. Database encryption
c. Data cleansing and analytics
d. Database monitoring
Give this one a try later!
a. Data backups and archives
,For data that is at rest, what is the best method to protect the data?
Firewall
Encryption
Backup data on the server
Place locks on all server racks and cabinets, enforce AAA for all assets and deploy a
firewall
Give this one a try later!
Encryption
An office's infrastructure connects network devices and printers through a central
access point without the use of cabling. Which network type does this office use?
a. WLAN
b. WAN
c. CAN
d. SAN
Give this one a try later!
WLAN
You have a small network that uses a switch to connect multiple devices. Which
physical topology are you using?
Mesh
Ring
Star
Bus
, Give this one a try later!
Star
Which network is this? I allow computers to communicate with each other in the same
building
WAN
LAN
SAN
CAN
Give this one a try later!
LAN
Your company purchases a new bridge that filters packets based on the MAC address
of the destination computer. On which layer of the OSI model is this device
functioning?*
Data Link
Presentation
Session
Application
Give this one a try later!
Data Link
answers.
Lock all doors to IT assets
Remove default or out of the box passwords.
Remove all unnecessary logins
Keep patches up to date
Audit Access
Give this one a try later!
, Lock all doors to IT assets
Remove default or out of the box passwords.
Remove all unnecessary logins
Keep patches up to date
Audit Access
An administrator fails to configure protection for usernames and passwords
transmitted across the network. Which component of the AAA model is weakened?
a. Authentication
b. Authorization
c. Access
d. Availability
Give this one a try later!
a. Authentication
Which cloud feature is used to prevent data loss and provide for data retrieval in the
event of a disaster?
a. Data backups and archives
b. Database encryption
c. Data cleansing and analytics
d. Database monitoring
Give this one a try later!
a. Data backups and archives
,For data that is at rest, what is the best method to protect the data?
Firewall
Encryption
Backup data on the server
Place locks on all server racks and cabinets, enforce AAA for all assets and deploy a
firewall
Give this one a try later!
Encryption
An office's infrastructure connects network devices and printers through a central
access point without the use of cabling. Which network type does this office use?
a. WLAN
b. WAN
c. CAN
d. SAN
Give this one a try later!
WLAN
You have a small network that uses a switch to connect multiple devices. Which
physical topology are you using?
Mesh
Ring
Star
Bus
, Give this one a try later!
Star
Which network is this? I allow computers to communicate with each other in the same
building
WAN
LAN
SAN
CAN
Give this one a try later!
LAN
Your company purchases a new bridge that filters packets based on the MAC address
of the destination computer. On which layer of the OSI model is this device
functioning?*
Data Link
Presentation
Session
Application
Give this one a try later!
Data Link