Which of the following types of attack is described in this scenario?
A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?A ....
Which of the following explains why this device is secure?
A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?A . Because secure protocols would reject malicious packetsB ....
Which of the following would be the BEST channel on which to set up the WAPs?
A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to...
When trying to determine the best channel, which of the following is the BEST tool to use?
A network technician is setting up a WiFi network in a multi-tenant building. When trying to determine the best channel, which of the following is the BEST tool to use?A . Protocol analyzerB . Tone generatorC . Spectrum analyzerD . MultimeterView AnswerAnswer: C
Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?
Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?A . Powerline extenderB . Ethernet-over-power adapterC . Power-over-Ethernet switchD . Power distribution unitE . Ethernet power controllerView AnswerAnswer: C
Which of the following solutions should the technician Implement?
A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on site. Which of the following solutions...
Which of the following has the network technician discovered?
A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the...
Which of the following policies did the technician violate'?
A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat. Which of the following policies did the technician violate'?A . Data loss preventionB . Incident responseC . Asset disposalD . Acceptable useView AnswerAnswer:...
Which of the following BEST describes the correct configuration?
A customer has submitted a request for a new wireless connection In the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST...
Which of the following devices should be used to break up broadcast domains?
Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains?A . Layer 2 switchB . Layer 3 switchC . Signal repeaterD . BridgeE . Domain serverView AnswerAnswer: B