<< Prev Question Next Question >>

Question 45/76

An organization is struggling with scaling issues on its VPN concentrator and internet circuit due to remote work. The organization is looking for a software solution that will allow it to reduce traffic on the VPN and internet circuit, while still providing encrypted tunnel access to the data center and monitoring of remote employee internet traffic. Which of the following will help achieve these objectives?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (76q)
Question 1: Which of the following is the best way to consistently deter...
Question 2: A company needs to provide administrative access to internal...
Question 3: A client asked a security company to provide a document outl...
Question 4: An IT manager informs the entire help desk staff that only t...
Question 5: Which of the following roles, according to the shared respon...
Question 6: A company is expanding its threat surface program and allowi...
Question 7: A company is required to use certified hardware when buildin...
Question 8: An engineer needs to find a solution that creates an added l...
1 commentQuestion 9: A company purchased cyber insurance to address items listed ...
Question 10: Which of the following automation use cases would best enhan...
Question 11: Which of the following describes a security alerting and mon...
Question 12: A newly identified network access vulnerability has been fou...
Question 13: A technician needs to apply a high-priority patch to a produ...
Question 14: Which of the following exercises should an organization use ...
Question 15: Security controls in a data center are being reviewed to ens...
Question 16: Which of the following vulnerabilities is exploited when an ...
Question 17: An organization wants a third-party vendor to do a penetrati...
Question 18: An organization wants a third-party vendor to do a penetrati...
Question 19: A Chief Information Security Officer wants to monitor the co...
Question 20: While troubleshooting a firewall configuration, a technician...
Question 21: A penetration tester begins an engagement by performing port...
Question 22: A security analyst is reviewing alerts in the SIEM related t...
Question 23: Which of the following has been implemented when a host-base...
Question 24: Which of the following security control types does an accept...
Question 25: A security analyst and the management team are reviewing the...
Question 26: Users at a company are reporting they are unable to access t...
Question 27: After a security incident, a systems administrator asks the ...
Question 28: Which of the following practices would be best to prevent an...
Question 29: After a recent ransomware attack on a company's system, an a...
Question 30: A systems administrator set up a perimeter firewall but cont...
Question 31: An organization's internet-facing website was compromised wh...
Question 32: An administrator was notified that a user logged in remotely...
Question 33: A company prevented direct access from the database administ...
Question 34: A security engineer is implementing FDE for all laptops in a...
Question 35: A company has begun labeling all laptops with asset inventor...
Question 36: A security analyst is reviewing the following logs: (Exhibit...
Question 37: An administrator discovers that some files on a database ser...
Question 38: Which of the following can be used to identify potential att...
Question 39: A healthcare organization wants to provide a web application...
Question 40: A company is concerned about weather events causing damage t...
Question 41: A user is attempting to patch a critical system, but the pat...
Question 42: An enterprise has been experiencing attacks focused on explo...
Question 43: A company is developing a business continuity strategy and n...
Question 44: Which of the following security concepts is the best reason ...
Question 45: An organization is struggling with scaling issues on its VPN...
Question 46: Which of the following agreement types defines the time fram...
Question 47: Which of the following is used to add extra complexity befor...
Question 48: A newly appointed board member with cybersecurity knowledge ...
Question 49: A systems administrator is looking for a low-cost applicatio...
Question 50: A data administrator is configuring authentication for a Saa...
Question 51: A technician is opening ports on a firewall for a new system...
Question 52: A U.S.-based cloud-hosting provider wants to expand its data...
Question 53: Which of the following is a hardware-specific vulnerability?...
Question 54: After a recent vulnerability scan, a security engineer needs...
Question 55: A software development manager wants to ensure the authentic...
Question 56: Which of the following methods to secure credit card data is...
Question 57: Which of the following is required for an organization to pr...
Question 58: A company hired a consultant to perform an offensive securit...
Question 59: After reviewing the following vulnerability scanning report:...
Question 60: Which of the following scenarios describes a possible busine...
Question 61: An employee receives a text message that appears to have bee...
Question 62: A company's marketing department collects, modifies, and sto...
Question 63: An enterprise is trying to limit outbound DNS traffic origin...
Question 64: A network manager wants to protect the company's VPN by impl...
Question 65: A business received a small grant to migrate its infrastruct...
Question 66: A company is discarding a classified storage array and hires...
Question 67: Which of the following best practices gives administrators a...
Question 68: Which of the following is the most likely to be included as ...
1 commentQuestion 69: A company decided to reduce the cost of its annual cyber ins...
1 commentQuestion 70: Which of the following would be the best way to handle a cri...
Question 71: A security administrator would like to protect data on emplo...
Question 72: An administrator assists the legal and compliance team with ...
Question 73: Which of the following is the best reason to complete an aud...
Question 74: An employee clicked a link in an email from a payment websit...
Question 75: A cyber operations team informs a security analyst about a n...
Question 76: An organization is leveraging a VPN between its headquarters...