Which of the following factors will the administrator consider when deciding on the appropriate backup medium?

Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium?A . Capability B. Accountability C. Extensibility D. ReliabilityView AnswerAnswer: A,C,D

June 1, 2023 No Comments READ MORE +

What does this source address signify?

Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?A . This address means that the source is using an IPv6...

June 1, 2023 No Comments READ MORE +

Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?

Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?A . Application sandboxing B. Deployment of WAFS C. Application whitelisting D. Application blacklistingView AnswerAnswer: A

May 31, 2023 No Comments READ MORE +

Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?

John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?A ....

May 31, 2023 No Comments READ MORE +

What is the first step they should do to create the network vulnerability assessment plan?

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how...

May 31, 2023 No Comments READ MORE +

-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)A . 802.15.4 B. 802.15 C. 802.12 D. 802.16View AnswerAnswer: D

May 30, 2023 No Comments READ MORE +

What IP address class is the network range a part of?

A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?A . Class C B. Class A C. Class B D. Class DView AnswerAnswer: B

May 30, 2023 No Comments READ MORE +

What are the other f unction(s) of the device?

A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)A . Provides access memory, achieving high efficiency B. Assigns user addresses C. Enables input/output (I/O) operations D. Manages security keysView AnswerAnswer: B,C,D

May 30, 2023 No Comments READ MORE +

Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.

Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s...

May 29, 2023 No Comments READ MORE +

Which command is used to change the permissions of a file or directory?

Which command is used to change the permissions of a file or directory?A . rmdir B. systemctl C. kill D. chmodView AnswerAnswer: D

May 29, 2023 No Comments READ MORE +