1 / 5 Which of the following answers lists a /27 subnet mask?
2 / 5 A network device for managing the optimal distribution of workloads across computing resources is called:
3 / 5 Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?
4 / 5 One of the measures for securing networking devices includes the practice of disabling unused ports.
5 / 5 URL filtering restricts access to Internet sites based on which of the following criteria?