Which of the following would be BEST to use to stop this from happening without physically removing the WAP?

A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?A . Password complexity B. Port security C. Wireless client isolation D. Secure SNMPView AnswerAnswer:...

December 29, 2022 No Comments READ MORE +

Which of the following attacks did the network administrator prevent?

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twin B. Tailgating C. Piggybacking D. Shoulder surfingView AnswerAnswer: B

December 29, 2022 No Comments READ MORE +

Which of the following command-line tools would generate this output?

Given the following information: Which of the following command-line tools would generate this output?A . netstat B. arp C. dig D. tracertView AnswerAnswer: A

December 28, 2022 No Comments READ MORE +

Which of the following should the technician review on the switch to locate the device’s network port?

A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route table B. VLAN tag C. MAC table D. QoS tagView...

December 28, 2022 No Comments READ MORE +

Which of the following should a network technician do FIRST?

A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?A . Check the system’s IP address B. Do a ping test against the servers C. Reseat the cables into the back of the PC...

December 28, 2022 No Comments READ MORE +

Which of the following commands would BEST help the administrator accomplish this task?

A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?A . dig B. arp C. show interface D. hostnameView AnswerAnswer: A

December 27, 2022 No Comments READ MORE +

Which of the following should the network administrator do to accomplish these requirements?

Allow devices to move to different switchports on the same VLAN Which of the following should the network administrator do to accomplish these requirements?A . Set up a reservation for each device B. Configure a static IP on each device C. Implement private VLANs for each device D. Use DHCP...

December 27, 2022 No Comments READ MORE +

Which of the following would MOST likely be used to review previous upgrades to a system?

Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity plan B. Change management C. System life cycle D. Standard operating proceduresView AnswerAnswer: B

December 27, 2022 No Comments READ MORE +

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSO B. TACACS+ C. Zero Trust D. Separation of duties E. Multifactor authenticationView AnswerAnswer: B

December 27, 2022 No Comments READ MORE +

Within the realm of network security, Zero Trust:

Within the realm of network security, Zero Trust:A . prevents attackers from moving laterally through a system. B. allows a server to communicate with outside networks without a firewall. C. block malicious software that is too new to be found in virus definitions. D. stops infected files from being downloaded...

December 27, 2022 No Comments READ MORE +