Which of the following would be BEST to use to detect a MAC spoofing attack?

Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message ProtocolB . Reverse Address Resolution ProtocolC . Dynamic Host Configuration ProtocolD . Internet Message Access ProtocolView AnswerAnswer: B Explanation: Reverse Address Resolution Protocol (RARP) is a protocol that allows a device...

September 11, 2024 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?A . The link is improperly terminatedB . One of the devices...

September 11, 2024 No Comments READ MORE +

Which of the following is the number of additional network connections needed?

An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology. Which of the following is the number of additional network connections needed?A . 5B . 7C . 10D . 15View AnswerAnswer: C Explanation: 10 additional network connections are needed to transition from...

September 11, 2024 No Comments READ MORE +

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?A . FirewallB . APC . Proxy serverD . IDSView AnswerAnswer: D Explanation: IDS stands for intrusion detection system, which is a network appliance that monitors network traffic and alerts administrators of...

September 11, 2024 No Comments READ MORE +

Which of the following should a wireless technician do NEXT to troubleshoot this issue?

Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a...

September 10, 2024 No Comments READ MORE +

Which of the following is MOST likely the cause?

A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of...

September 10, 2024 No Comments READ MORE +

Which of the following should a network administrator configure to BEST prevent unauthorized access?

There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...

September 10, 2024 No Comments READ MORE +

Which of the following should the technician review on the switch to locate the device’s network port?

A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route tableB . VLAN tagC . MAC tableD . QoS tagView...

September 9, 2024 No Comments READ MORE +

Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?

A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?A . CDMAB . CSMA/CDC . CSMA/CAD . GSMView AnswerAnswer: C Explanation: CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is an...

September 9, 2024 No Comments READ MORE +

Which of the following should the technician configure on the switch to prevent unintended connections?

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?A . DHCP snoopingB . GeofencingC . Port securityD . Secure SNMPView AnswerAnswer: C Explanation: Port security is a feature that...

September 9, 2024 No Comments READ MORE +