- (Exam Topic 1)
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
Correct Answer:A
- (Exam Topic 1)
A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?
Correct Answer:D
- (Exam Topic 1)
Which of the following devices should a network administrator configure on the outermost part of the network?
Correct Answer:D
- (Exam Topic 1)
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?
Correct Answer:A
- (Exam Topic 1)
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before installing the firmware update, which of the following
steps should the technician perform to ensure file integrity?
Correct Answer:B