Question 106
Which of the following protocols is used to transport outgoing mail across networks?
Question 107
A technician is downloading an ISO from a vendor's website. To ensure the integrity of the download,
which of the following should be verified?
which of the following should be verified?
Question 108
A company decides to deploy customer-facing, touch-scan kiosks. The kiosks appear to have several open service ports that could potentially become compromised. Which of the following is the MOST effective way to protocol the kiosks?
Question 109
A critical vulnerable is discovered on a network device. The vendor state it has already patched this vulnerable in its current release. Which of the following actions should an administrator take?
Question 110
A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?