Question 56

There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?
  • Question 57

    A network administrator is performing a major to the upgrade to the network. Which of the following should the administrator use in a case of a failure?
  • Question 58

    A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
  • Question 59

    An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?
  • Question 60

    A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company's firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?