A company deploys many workers in the field who remotely access files from a server at headquarters.
Leadership is concerned about the risks posed when field workers update these files from unsecured networks. Which of the following policy changes can the company make to MOST improve the confidentiality of connections when connecting remotely? (Choose two.)
Which of the following should a network administrator deploy to control all preventive security measures?
A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?
The IT director has requested that systems administrators be able to RDP to their servers. Internal users should not be able to access external websites that do not use HTTPS. The network technician implements the following ruleset:
10 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 3389
20 deny tcp 192.168.1.0 0.0.0.255 any eq 80
30 permit tcp 192.168.1.0 0.0.0.255 any eq 443
40 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 80
50 deny ip any any
After implementing this change, users on the 192.168.1.0/24 subnet begin reporting they can no longer access internal servers, Which of the following should the network technician do to correct the issue
and satisfy the director's request?