questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following encryption methods does PKI typically use to securely project keys?

Digital signatures

Each server on a subnet is configured to only allow SSH access from the administrator's workstation. Which of the following BEST describes this implementation?

Host based firewall Keyword in question is "administrators workstation"

During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?

Port scanner

Which of the following services are used to support authentication services for several local devices from a central location without the use of tokens

TACACS+

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?

VPN Keyword (Internal Routing)

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?

Virtual Switches with VLANS


Conjuntos de estudio relacionados

LUOA's 8th Grade Physical Science 9.29.F - Quiz: Atoms and the Periodic Table

View Set

Brokerage Relationships In Florida (Study Set 3)

View Set

The States of India and their capitals

View Set