Which of the following methods limits access to a network based on characteristics of the network card?
Which of the following methods limits access to a network based on characteristics of the network card?A . IP filteringB . MAC filteringC . Port filteringD . EncryptionView AnswerAnswer: B
Which of the following threats is MOST likely involved?
A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?A . Smurf attackB . Rogue APC . Compromised systemD . Unintentional DoSView AnswerAnswer: C
Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?A . Enable mixed modeB . Disable SSIDC . Disable encryptionD . Enable `n' only modeView...
Which of the following has the user MOST likely introduced to the network?
A network technician receives a call from a use who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced...
Which of the following is a secure way to connect to a device?
Which of the following is a secure way to connect to a device?A . RSHB . TFTPC . SNMPv2D . SFTPView AnswerAnswer: D
Which of the following defines an IP address that is NOT routed on the Internet?
Which of the following defines an IP address that is NOT routed on the Internet?A . MulticastB . PublicC . PrivateD . ClassfulView AnswerAnswer: C
Multiple users are reporting that they are unable to access the network. The ENTIRE network is shown in the diagram. PCs are not statically assigned IP addresses. The following devices will display settings.
Multiple users are reporting that they are unable to access the network. The ENTIRE network is shown in the diagram. PCs are not statically assigned IP addresses. The following devices will display settings. • WorkstationA • WorkstationB • WofkstationC • WorkstationD • WokstationE • WorkstalionF • WorkstalionG • Laptop1 •...
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?A . An IPSB . A protocol analyzerC . A traffic shaperD . An IDSView AnswerAnswer: A
Which of the following could be used to estimate RTT across a router?
Which of the following could be used to estimate RTT across a router?A . DigB . TracerouteC . ArpD . UptimeView AnswerAnswer: B
Which of the following is needed to protect BOTH the employee and the company?
An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?A . An NDA ensuring work data stored on the personal phone remains confidentialB ....