Question 26

Which of the following technologies are X.509 certificates most commonly associated with?
  • Question 27

    Which of the following is the next step to take after successfully testing a root cause theory?
  • Question 28

    A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?
  • Question 29

    Which of the following are the best device-hardening techniques for network security? (Select two).
  • Question 30

    SIMULATION
    A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:
    . Devices in both buildings should be
    able to access the Internet.
    . Security insists that all Internet traffic
    be inspected before entering the
    network.
    . Desktops should not see traffic
    destined for other devices.
    INSTRUCTIONS
    Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.
    Not all devices will be used, but all locations should be filled.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.