questions
Which of the following encryption methods does PKI typically use to securely project keys?
Digital signatures
Each server on a subnet is configured to only allow SSH access from the administrator's workstation. Which of the following BEST describes this implementation?
Host based firewall Keyword in question is "administrators workstation"
During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?
Port scanner
Which of the following services are used to support authentication services for several local devices from a central location without the use of tokens
TACACS+
A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?
VPN Keyword (Internal Routing)
A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?
Virtual Switches with VLANS