Which of the following attack types BEST describes this action?

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D

December 27, 2022 No Comments READ MORE +

Which of the following would be MOST affected by this statistic?

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?A . A VoIP sales call with a...

December 27, 2022 No Comments READ MORE +

Which of the following metrics confirms there is a cabling issue?

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...

December 27, 2022 No Comments READ MORE +

Which of the following steps will MOST likely determine the cause of the issue?

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the...

December 26, 2022 No Comments READ MORE +

To which of the following addresses should the software be configured to send the query?

A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?A . 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31View AnswerAnswer:...

December 26, 2022 No Comments READ MORE +

Which of the following subnets should the technician use?

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?A . 255.255.128.0 B. 255.255.192.0 C. 255.255.240.0 D. 255.255.248.0View AnswerAnswer: C

December 26, 2022 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?A . The link is improperly terminated B. One of the devices...

December 26, 2022 No Comments READ MORE +

Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?

Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?A . Vulnerability assessment B. Factory reset C. Firmware update D. Screened subnetView AnswerAnswer: C

December 26, 2022 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?A...

December 26, 2022 No Comments READ MORE +

Which of the following is used to track and document various types of known vulnerabilities?

Which of the following is used to track and document various types of known vulnerabilities?A . CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilegeView AnswerAnswer: A

December 26, 2022 No Comments READ MORE +