A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A
Which of the following would BEST assist the security manager identifying systems involved in security incidents?
The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?A . Enforce...
Which of the following should be leveraged to complete this task?
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC...
Which of the following utilities was he MOST likely using to view this issue?
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?A . Spam filterB...
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist?
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist?A . 3B . 12C . 13D . 14E . 15View AnswerAnswer: D
Which of the following is the MOST likely reason some users cannot connect?
A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point. Which of the following is the MOST likely reason some users cannot connect?A . Incorrect channelB . Weak encryptionC . Incompatible NICsD ....
Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?
A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?A . /24B . /25C . /30D . /32View AnswerAnswer: C
A firewall that operates at Layer 7 of the OSI model is known as a(n):
A firewall that operates at Layer 7 of the OSI model is known as a(n):A . Circuit gatewayB . Packet filterC . Application levelD . Redundant firewallView AnswerAnswer: C
Which of the following mediums is circuit switched?
Which of the following mediums is circuit switched?A . PSTNB . ATMC . Frame relayD . MPLSView AnswerAnswer: A
Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?
Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?A . CAT3B . CAT5C . CAT5eD . CAT6View AnswerAnswer: B