Question 21

What happens to users' internet traffic in a split-tunneling VPN?
  • Question 22

    An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules.
    Which of the following ports should be open to satisfy the requirements?
  • Question 23

    If a switch has port security enabled and a new device with a different MAC address is connected, what will happen?
  • Question 24

    Which of the following attacks would most likely cause duplicate IP addresses in a network?
  • Question 25

    Which of the following types of network architecture typically uses leased lines to provide dedicated, private connections between multiple satellite offices and a head office?