Question 6 of 1780
The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data should be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged.
Which of the following would BEST meet the CISOs requirements?
Correct Answer: C

Question 7 of 1780
Which of the following network design elements allows for many internal devices to share one public IP address?
Correct Answer: B

Question 8 of 1780
Which of the following is the best practice when securing a switch from physical access?
Correct Answer: D

Disabling unused ports is a best practice when securing a switch from physical access because it prevents unauthorized devices from connecting to the network through an unused port. This limits the opportunity for unauthorized physical connections that could compromise network security. By ensuring that only active and necessary ports are enabled, you minimize the risk of unauthorized access through physical means.

Question 9 of 1780
Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?
Correct Answer: B

Question 10 of 1780
Pete, the system administrator, wishes to monitor and limit users access to external websites.
Which of the following would BEST address this?
Correct Answer: D

Installing a proxy server would best address the need to monitor and limit users' access to external websites. A proxy server can control and filter web traffic, ensuring that users only access permitted sites while blocking known malicious or restricted sites. Furthermore, proxy servers can provide logging and reporting features essential for monitoring user activity.