Question 6 of 1780

The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data should be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged.
Which of the following would BEST meet the CISOs requirements?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 1780

Which of the following network design elements allows for many internal devices to share one public IP address?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 1780

Which of the following is the best practice when securing a switch from physical access?
Answer

Suggested Answer

The suggested answer is D.

Disabling unused ports is a best practice when securing a switch from physical access because it prevents unauthorized devices from connecting to the network through an unused port. This limits the opportunity for unauthorized physical connections that could compromise network security. By ensuring that only active and necessary ports are enabled, you minimize the risk of unauthorized access through physical means.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 1780

Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 1780

Pete, the system administrator, wishes to monitor and limit users access to external websites.
Which of the following would BEST address this?
Answer

Suggested Answer

The suggested answer is D.

Installing a proxy server would best address the need to monitor and limit users' access to external websites. A proxy server can control and filter web traffic, ensuring that users only access permitted sites while blocking known malicious or restricted sites. Furthermore, proxy servers can provide logging and reporting features essential for monitoring user activity.

Community Votes

No votes yet

Join the discussion to cast yours