questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following encryption methods does PKI typically use to securely project keys?

Digital signatures

Each server on a subnet is configured to only allow SSH access from the administrator's workstation. Which of the following BEST describes this implementation?

Host based firewall Keyword in question is "administrators workstation"

During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?

Port scanner

Which of the following services are used to support authentication services for several local devices from a central location without the use of tokens

TACACS+

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?

VPN Keyword (Internal Routing)

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?

Virtual Switches with VLANS


Ensembles d'études connexes

Brokerage Relationships In Florida (Study Set 3)

View Set

The States of India and their capitals

View Set