A UTM is deployed on the external edge of the main corporate office. The office connects to the
WAN port of the edge router. The edge router at the main office connects to the remote offices using
GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM
has spread from the remote sites into the corporate network. The UTM currently has traffic rules
applied that should block the port used by the worm. Which of the following steps would MOST
likely correct this issue?
Question No 2
A technician has racked a new access switch and has run multimode fiber to a new location. After
installing an extended - range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the
access switch and connected the port to the new extension with a fiber jumper. However, the link
does not display, and the technician cannot see light emitting from the core switch. Which of the
following solutions is MOST likely to resolve the problem?
Question No 3
A network technician has implemented ACLs to limit access to cloud - based file storage. Which of the
following security mechanisms has the technician enforced?
Question No 4
A network technician receives a call from a user in the accounting department stating that Internet
connectivity has been lost after receiving a new workstation. No other users in accounting are
reporting similar issues. The network technician is able to ping the machine from the accounting
department’s router, but is not able to ping the machine from the IT network. Which of the following
is MOST likely the cause?
Question No 5
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening
on a non - standard socket. Which of the following types of rules is the administrator implementing?