Which of the following tools would provide the information on TCP connections?

A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would provide the information on TCP connections?A . netstatB . tracertC . arpD . ipconfigE . routeView AnswerAnswer: A

December 2, 2018 No Comments READ MORE +

Which of the following protocols will support secure transmission of the data?

Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?A . SNMP v2B . VPNC . SYSLOGD . SMTPView AnswerAnswer:...

December 2, 2018 No Comments READ MORE +

In which of the following ways does a DDoS attack differ from a spoofing attack?

In which of the following ways does a DDoS attack differ from a spoofing attack?A . DDoS attacks target multiple networksB . Spoofing attacks originate from a single hostC . DDoS attacks are launched from multiple hostsD . Spoofing attacks require physical presenceView AnswerAnswer: C

December 1, 2018 No Comments READ MORE +

Which of the following would MOST likely resolve the users' connection issues?

An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of...

November 30, 2018 No Comments READ MORE +

Which of the following policies is being agreed to in the SLA?

The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal...

November 30, 2018 No Comments READ MORE +

Which of the following will prevent switching loops by selectively shutting down switch ports?

Which of the following will prevent switching loops by selectively shutting down switch ports?A . RIPB . IGPC . STPD . VLANView AnswerAnswer: C

November 29, 2018 No Comments READ MORE +

Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?

A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?A...

November 29, 2018 No Comments READ MORE +

Which of the following is true about tunneling and encryption?

Which of the following is true about tunneling and encryption?A . SIP encrypts all data going through the tunnel.B . PPTP creates a secure tunnel.C . SSL VPN provides a secure tunnel.D . RAS is a secure way to create a tunnel.View AnswerAnswer: C

November 29, 2018 No Comments READ MORE +

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)A . VPN concentratorB . Proxy serverC . Wireless controllerD . RADIUS serverE . Multilayer switchView AnswerAnswer: C,D

November 27, 2018 No Comments READ MORE +

Which of the following attacks has the analyst successfully performed in this scenario?

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake...

November 26, 2018 No Comments READ MORE +