Which of the following protocols provides a secure connection between two networks?
A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?
A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?