Question 106

Which of the following protocols is used to transport outgoing mail across networks?
  • Question 107

    A technician is downloading an ISO from a vendor's website. To ensure the integrity of the download,
    which of the following should be verified?
  • Question 108

    A company decides to deploy customer-facing, touch-scan kiosks. The kiosks appear to have several open service ports that could potentially become compromised. Which of the following is the MOST effective way to protocol the kiosks?
  • Question 109

    A critical vulnerable is discovered on a network device. The vendor state it has already patched this vulnerable in its current release. Which of the following actions should an administrator take?
  • Question 110

    A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?