Question 481

Which of the following protocols are classified as connectionless? (Select TWO)
  • Question 482

    A company deploys many workers in the field who remotely access files from a server at headquarters.
    Leadership is concerned about the risks posed when field workers update these files from unsecured networks.
    Which of the following policy changes can the company make to MOST improve the confidentiality of connections when connecting remotely? (Choose two.)
  • Question 483

    A zero-day vulnerability is discoverd that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?
  • Question 484

    A user in the marketing department reports the email server is down. The user has not received email for more than 24 hours. Which of the following should the network technician do to investigate this issue?
  • Question 485

    Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).