Which of the following logical access control methods would a security administrator need to
modify in order to control network traffic passing through a router to a different network?
A. Configuring VLAN 1
C. Logical tokens
D. Role-based access control changes
Which of the following tools limits external access to the network?
Which of the following tools was created for the primary purpose of reporting the services that are
open for connection on a networked workstation?
A. Protocol analyzer
B. Port scanner
C. Password crackers
D. Vulnerability scanner
Which of the following is MOST likely to be an issue when turning on all auditing functions within a system?
A. Flooding the network with all of the log information
B. Lack of support for standardized log review tools
C. Too much information to review
D. Too many available log aggregation tools
Upon opening the browser, a guest user is redirected to the company portal and asked to agree to
the acceptable use policy. Which of the following is MOST likely causing this to appear?