Which of the following should the technician do to make a crossover cable before crimping the new plug?
A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off...
Which of the following should the technician choose that all the equipment would support?
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the...
Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?
Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
Which of the following MUST be implemented to share metrics between routing protocols within the same router?A . Routing loopB . Routing tableC . Route redistributionD . Dynamic routesView AnswerAnswer: B
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A
Which of the following should the network administrator do to rule out any problems at Layer 1?
A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following...
Which of the following tools would allow the technician to view the handshake?
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of...
On this particular network, which of the following is the number of collision domain that exist?
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist?A . 3B . 12C . 13D . 14E . 15View AnswerAnswer: D
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:A . penetration testingB . vulnerability scanningC . reconnaissanceD . social engineeringView AnswerAnswer: A
Which of the following 802.11 standards provides the MOST bandwidth?
A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?A . aB . acC . gD . nView...