A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?
A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?
Which of the following protocol ports should be used to securely transfer a file?
A user's home mesh wireless network is experiencing latency issues. A technician has:
•Performed a speed test.
•Rebooted the devices.
•Performed a site survey.
•Performed a wireless packet capture.
The technician reviews the following information:
The technician notices in the packet capture that frames were retransmitted. Which of the following is the most likely cause of the user's network issue?
A support engineer is troubleshooting a network outage that is affecting 3,000 users. The engineer has isolated the issue to the internet firewall. Packet captures confirm that the firewall is blocking the traffic. Which of the following is the next step in troubleshooting?
Which of the following must be implemented to securely connect a company's headquarters with a branch location?
Which of the following would be violated if an employee accidentally deleted a customer's data?
Which of the following troubleshooting steps provides a change advisory board with the information needed to make a decision?
Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?
 
						 
						