Globalhomeworkhelp

HURRY  up AND GET THE DISCOUNT AT 20 %

Boost your Grades with us today!

  • estion 1

    0 out of 5 points

    Incorrect
    Bill’s work-issued Windows laptop has been configured so he can remotely connect to his office from home without having to initiate a virtual private network (VPN) connection. What technology is he using?
    Selected Answer:
    Incorrect

    RD RemoteApp
    Answers:
    Correct

  • Question 2

    5 out of 5 points

    Correct
    Online backups make an organization dependent on the online provider’s security.
    Selected Answer:
    Correct

    True

    Answers:
    Correct

    True

    False

  • Question 3

    5 out of 5 points

    Correct
    A virtual private network (VPN) implementation best practice is to protect the VPN server behind a firewall.
    Selected Answer:
    Correct

    True
    Answers:
    Correct

  • Question 4

    5 out of 5 points

    Correct
    A firewall allows you to restrict unauthorized access between the Internet and an internal network.
    Selected Answer:
    Correct

    True

    Answers:
    Correct

    True

    False

  • Question 5

    5 out of 5 points

    Correct
    Which of the following is a common firewall philosophy?
    Selected Answer:
    Correct

    Deny by default
    Answers:
    Correct

  • Question 6

    5 out of 5 points

    Correct
    The goal of the Electronic Privacy Information Center (EPIC) is to preserve consumer privacy in the state of California.
    Selected Answer:
    Correct

    False

    Answers:

    True

    Correct

    False

  • Question 7

    5 out of 5 points

    Correct
    Which of the following establishes what a user can and cannot do relative to virtual private networking?
    Selected Answer:
    Correct

    Authorization
    Answers:
    Correct

  • Question 8

    0 out of 5 points

    Incorrect
    Carl is a network technician who has been assigned to select a dedicated hardware device to act as the company’s termination point for the secured virtual private network (VPN) tunnel. He chooses a device that allows the firewall to filter traffic exiting the VPN to move into the local area network (LAN). It is one that is best suited for controlled access into the demilitarized zone (DMZ). What is the solution that he recommends?
    Selected Answer:
    Incorrect

    Corporate firewall
    Answers:
    Correct

  • Question 9

    5 out of 5 points

    Correct
    Which of the following is a European Union (EU) regulation that protects citizens’ privacy and information?
    Selected Answer:
    Correct

    General Data Protection Regulation (GDRP)
    Answers:
    Correct

  • Question 10

    5 out of 5 points

    Correct
    Santiago is a new network engineer for a mid-sized company. It is his responsibility to ensure that all employees working from home are able to connect to the office network in an efficient and secure manner. He must provide a service that allows communications between out-of-office staff and network resources to be encrypted at the protocol level and to be performed by either client or server software. The solution must also ensure that even if protocol encryption fails, the data is safe by its own encryption. What solution does he select?
    Selected Answer:
    Correct

    Virtual private network (VPN)
    Answers:
    Correct

  • Question 11

    0 out of 5 points

    Incorrect
    Which of the following is described as an approach to network security in which each administrator is given sufficient privileges only within a limited scope of responsibility?
    Selected Answer:
    Incorrect

    Simplicity
    Answers:
    Correct

  • Question 12

    5 out of 5 points

    Correct
    A virtual private network (VPN) policy documents an organization’s rules for using the VPN.
    Selected Answer:
    Correct

    True

    Answers:
    Correct

    True

    False

  • Question 13

    5 out of 5 points

    Correct
    The User Domain of an IT infrastructure refers to actual users, whether they are employees, consultants, contractors, or other third-party users.
    Selected Answer:
    Correct

    True

    Answers:
    Correct

    True

    False

  • Question 14

    0 out of 5 points

    Incorrect
    Arturo is installing a hardware server in the network room of a branch office. He wants to label it in a way that will be easy to differentiate it from other server machines but not clearly identify it should an unauthorized person gain physical access. How should he label it?
    Selected Answer:
    Incorrect

    Using the label “web server”
    Answers:
    Correct

  • Question 15

    0 out of 5 points

    Incorrect
    Vivienne has been commissioned to design a workgroup network infrastructure for a small office comprised of five workstations, three laptops, and a printer. Given that some of the nodes are stationary and others are mobile, what is the best solution for interconnectivity?
    Selected Answer:
    Incorrect

    Router
    Answers:
    Correct

  • Question 16

    5 out of 5 points

    Correct
    When considering network expenditures, sunk costs should not influence future choices.
    Selected Answer:
    Correct

    True

    Answers:
    Correct

    True

    False

  • Question 17

    0 out of 5 points

    Incorrect
    Although encryption standards and methods have become increasingly more sophisticated over time, what other evolving technology is making it easier to defeat encryption?
    Selected Answer:
    Incorrect

    Scaling algorithms
    Answers:
    Correct

  • Question 18

    5 out of 5 points

    Correct
    In deploying security for a network, which method is no longer seen as truly secure or sufficient for protecting logins?
    Selected Answer:
    Correct

    Single-factor authentication
    Answers:
    Correct

× Chat on WhatsApp