Question 141

Which of the following is used to determine whether or not a user's account is authorized to access a server remotely?
  • Question 142

    In which of the following ways does a DDoS attack differ from a spoofing attack?
  • Question 143

    A new building needs to be joined to an existing network, but management has decided that running fiber is too expensive. Since the buildings are bout 1000ft (305m) apart, the IT department has been asked to propose alternatives. Which of the following is the BEST device to add to each building to facilitate the extension of the network while meeting budgetary demands?
  • Question 144

    The IT manager at a small firm is in the process of renegotiating an SLA with the organization's ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization's internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?
  • Question 145

    A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate the router?