Which of the following attacks has occurred on the switch?
A network administrator is reviewing the following output from a switch. Which of the following attacks has occurred on the switch?A . DNS poisoningB . ARP poisoningC . VLAN hoppingD . MAC address spoofingView AnswerAnswer: B
Which of the following would mitigate this issue?
A network manager is concerned about visitors taking advantage of open cubicles at a company's facilities. Which of the following would mitigate this issue?A . Create a VLAN for all unused switchportsB . Implement a DM2 for all external servicesC . Implement root guard on all switchesD . Create a...
Which of the following MUST be installed on an employee’s computer if the remote access VPN implements an SSL VPN with PKI authentication?
Which of the following MUST be installed on an employee’s computer if the remote access VPN implements an SSL VPN with PKI authentication?A . Shared secretB . HTTPS serverC . Soft spokenD . Private certificateView AnswerAnswer: D
Which of the following is MOST likely in place?
A technician has replaced a customer’s desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources. The technician suspects the desktop has not been kept up to date with security patches. Which of the following is MOST likely in place?A . ACLB ....
Which of the following standards BEST fits these requirements?
A company wants to implement a wireless infrastructure on its campus to meet the needs of its BYOD initiative. The company has users with legacy devices and wants to accommodate them while delivering speed to other users who have modern systems. Which of the following standards BEST fits these requirements?A...
Which of the following BEST describes the type of cloud architecture being used?
A company runs Linux servers In its own datacenter and also on a popular public cloud service provider. The servers hosted by the cloud provider can only be accessed with proper authorization and are only accessed by the company’s datacenter. Which of the following BEST describes the type of cloud...
Which of the following BEST describes this process?
A request is made to open an additional port on a firewall. The request is approved, and the port is opened. Which of the following BEST describes this process?A . Standard operating procedureB . Process managementC . Project managementD . Change managementView AnswerAnswer: D
Which of the following cables would utilize both the TIA/EIA 568a and TIA/EIA 568b standards?
A technician needs to connect two routers using copper cables. Which of the following cables would utilize both the TIA/EIA 568a and TIA/EIA 568b standards?A . Cat5 crossoverB . Cat5e straight-throughC . Cat5e rolloverD . Cat6 consoleE . Cat6a straight-throughView AnswerAnswer: A
Which of the following activities MOST likely generated the report?
A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?A . Port enumerationB . Baseline reviewC . Vulnerability scanningD . Packet analysisView AnswerAnswer: C
Which of the following technologies should the network administrator implement?
A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network...