Which of the following rules would BEST allow access to the bank website?
Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules...
Which of the following tools should be used?
A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should be used?A . Protocol analyzerB . CrimperC . Cable testerD . Punch down toolView AnswerAnswer: C
Which of the following protocols requires MIBs?
A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols requires MIBs?A . IPSecB . SSLC . ISAKMPD . SNMPView AnswerAnswer: D
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?A . NDAB . IRPC . BYODD . SLAView AnswerAnswer: C
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?A . 0B . 1C . 2D . 6E . 12View AnswerAnswer: B
Which of the following policies should be followed?
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?A . Change management policyB . Remote access policyC . Acceptable use policyD . Memorandum of understandingView AnswerAnswer: A
Which of the following hardware tools would be used?
Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?A . Butt setB . Toner probeC . Wire mapperD . Cable certifierView AnswerAnswer: A
Which of the following BEST describes the differences between VLAN hopping and session hijacking?
Which of the following BEST describes the differences between VLAN hopping and session hijacking?A . VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commandsB . VLAN hopping is a brute force attack executed...
Which of the following tools would she use?
Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?A . OTDRB . MultimeterC . Punch down toolD . Temperature monitorView AnswerAnswer: C
Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?
Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?A . WhalingB . ImpersonationC . Privilege escalationD . Spear phishingView AnswerAnswer: A