-
estion 1
Bill’s work-issued Windows laptop has been configured so he can remotely connect to his office from home without having to initiate a virtual private network (VPN) connection. What technology is he using?Selected Answer: RD RemoteAppAnswers: -
Question 2
Online backups make an organization dependent on the online provider’s security.Selected Answer: True
Answers: True
False
-
Question 3
A virtual private network (VPN) implementation best practice is to protect the VPN server behind a firewall.Selected Answer: TrueAnswers: -
Question 4
A firewall allows you to restrict unauthorized access between the Internet and an internal network.Selected Answer: True
Answers: True
False
-
Question 5
Which of the following is a common firewall philosophy?Selected Answer: Deny by defaultAnswers: -
Question 6
The goal of the Electronic Privacy Information Center (EPIC) is to preserve consumer privacy in the state of California.Selected Answer: False
Answers: True
False
-
Question 7
Which of the following establishes what a user can and cannot do relative to virtual private networking?Selected Answer: AuthorizationAnswers: -
Question 8
Carl is a network technician who has been assigned to select a dedicated hardware device to act as the company’s termination point for the secured virtual private network (VPN) tunnel. He chooses a device that allows the firewall to filter traffic exiting the VPN to move into the local area network (LAN). It is one that is best suited for controlled access into the demilitarized zone (DMZ). What is the solution that he recommends?Selected Answer: Corporate firewallAnswers: -
Question 9
Which of the following is a European Union (EU) regulation that protects citizens’ privacy and information?Selected Answer: General Data Protection Regulation (GDRP)Answers: -
Question 10
Santiago is a new network engineer for a mid-sized company. It is his responsibility to ensure that all employees working from home are able to connect to the office network in an efficient and secure manner. He must provide a service that allows communications between out-of-office staff and network resources to be encrypted at the protocol level and to be performed by either client or server software. The solution must also ensure that even if protocol encryption fails, the data is safe by its own encryption. What solution does he select?Selected Answer: Virtual private network (VPN)Answers: -
Question 11
Which of the following is described as an approach to network security in which each administrator is given sufficient privileges only within a limited scope of responsibility?Selected Answer: SimplicityAnswers: -
Question 12
A virtual private network (VPN) policy documents an organization’s rules for using the VPN.Selected Answer: True
Answers: True
False
-
Question 13
The User Domain of an IT infrastructure refers to actual users, whether they are employees, consultants, contractors, or other third-party users.Selected Answer: True
Answers: True
False
-
Question 14
Arturo is installing a hardware server in the network room of a branch office. He wants to label it in a way that will be easy to differentiate it from other server machines but not clearly identify it should an unauthorized person gain physical access. How should he label it?Selected Answer: Using the label “web server”Answers: -
Question 15
Vivienne has been commissioned to design a workgroup network infrastructure for a small office comprised of five workstations, three laptops, and a printer. Given that some of the nodes are stationary and others are mobile, what is the best solution for interconnectivity?Selected Answer: RouterAnswers: -
Question 16
When considering network expenditures, sunk costs should not influence future choices.Selected Answer: True
Answers: True
False
-
Question 17
Although encryption standards and methods have become increasingly more sophisticated over time, what other evolving technology is making it easier to defeat encryption?Selected Answer: Scaling algorithmsAnswers: -
Question 18
In deploying security for a network, which method is no longer seen as truly secure or sufficient for protecting logins?Selected Answer: Single-factor authenticationAnswers: