Question 331
An administrator wants to implement an additional authentication factor to the remote SSH servers. Which
of the following accomplishes this goal with the principle of "something you have"?
of the following accomplishes this goal with the principle of "something you have"?
Question 332
A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who al have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement?
Question 333
A network technician receives a request for a disaster recovery solution. Management has requested no downtime in the event of a disaster. Which of the following disaster recovery solutions is the appropriate choice?
Question 334
Employees at a company report that they are unable to access the Internet. A network technician notices the workstations are receiving IP addresses that do not follow the IP addressing scheme of the corporate network.
Upon further inspection, the technician finds an employee has plugged a rogue wireless router Into the corporate network. Which of the following settings would have prevented this situation?
Upon further inspection, the technician finds an employee has plugged a rogue wireless router Into the corporate network. Which of the following settings would have prevented this situation?
Question 335
A technician replaces a failed router with a spare that has been in inventory for some time. After attempting
to enable HTTPS on the spare router, the technician discovers the feature is unavailable. The support
office was able to connect to the previous router. Which of the following actions should the technician
perform to enable HTTPS access for the support team?
to enable HTTPS on the spare router, the technician discovers the feature is unavailable. The support
office was able to connect to the previous router. Which of the following actions should the technician
perform to enable HTTPS access for the support team?