A security analyst discovers that several company devices ar…

A security analyst discovers that several company devices are communicating with known malicious external IP addresses. Upon further investigation, it is found that these devices are sending out large volumes of unsolicited traffic to various targets. Which of the following has MOST likely compromised these devices?  

You are a network administrator who is configuring a Windows…

You are a network administrator who is configuring a Windows Server for your organization. You want to ensure that the server uses the most secure and recommended system for network authentication, especially for services accessed by users within the organization’s network. Which authentication system should you configure to achieve this goal?

A freelance photographer is setting up a home office. They n…

A freelance photographer is setting up a home office. They need to connect a desktop, a laptop, a network printer, and occasionally, guests’ devices to the Internet and to each other for file sharing and printing. Which type of network is MOST suitable for this scenario?

You are setting up a new office for a software development c…

You are setting up a new office for a software development company that requires high-speed internet access for large data transfers and secure connections to multiple networks. The office is equipped with both copper and fiber optic infrastructure. You are tasked with selecting network interface cards (NICs) for the workstations that will meet these requirements. Which type of NIC should you choose for the workstations?

You are a network administrator tasked with improving the ef…

You are a network administrator tasked with improving the efficiency of your company’s network infrastructure. You want to replace several physical network appliances, such as routers and firewalls, with a more flexible and scalable solution. Which approach should you take to achieve this goal?