Question 21
What happens to users' internet traffic in a split-tunneling VPN?
Question 22
An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules.
Which of the following ports should be open to satisfy the requirements?
Which of the following ports should be open to satisfy the requirements?
Question 23
If a switch has port security enabled and a new device with a different MAC address is connected, what will happen?
Question 24
Which of the following attacks would most likely cause duplicate IP addresses in a network?
Question 25
Which of the following types of network architecture typically uses leased lines to provide dedicated, private connections between multiple satellite offices and a head office?
