Question 36

Which of the following is conducted frequently to maintain an updated list of a system's weaknesses?
  • Question 37

    You are tasked with verifying the following requirements are met in order to ensure network security.
    Requirements:
    Datacenter
    Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic Building A Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide devices to support 5 additional different office users Add an additional mobile user Replace the Telnet server with a more secure solution Screened subnet Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a server to handle external 80/443 traffic Provide a server to handle port 20/21 traffic INSTRUCTIONS Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.
    Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 38

    Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Select TWO).
  • Question 39

    A network engineer receives the following when connecting to a switch to configure a port:

    Which of the following is the MOST likely cause for the failure?
  • Question 40

    Which of the following topologies requites the MOST connections when designing a network?