Which of the following would be BEST to use to detect a MAC spoofing attack?
Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message ProtocolB . Reverse Address Resolution ProtocolC . Dynamic Host Configuration ProtocolD . Internet Message Access ProtocolView AnswerAnswer: B
Which of the following does this BEST protect against?
Users attending security training at work are advised not to use single words as passwords for corporate applications . Which of the following does this BEST protect against?A . An on-path attackB . A brute-force attackC . A dictionary attackD . MAC spoofingE . Denial of serviceView AnswerAnswer: C
Which of the following is MOST likely the cause of the issue?
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information: Which of the following is MOST likely the cause of the issue?A . Channel overlapB . Poor signalC . Incorrect power settingsD . Wrong antenna typeView AnswerAnswer: A
Which of the following should a technician configure?
A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients . Which of the following should a technician configure?A . Automate a continuous backup and restore...
With which of the following concepts is this technique MOST closely associated?
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?A . Insider threatB . War drivingC . Evil twinD . HoneypotView AnswerAnswer: D
Which of the following needs to be configured for these networks to reach each other?
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U . Which of the following needs to be configured for these networks to reach each other?A . Network address translationB . Default gatewayC . LoopbackD . Routing protocolView AnswerAnswer: B
With which of the following concepts is this technique MOST closely associated?
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?A . Insider threatB . War drivingC . Evil twinD . HoneypotView AnswerAnswer: D
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?A . Fault toleranceB . Quality of serviceC . Load balancingD . Port aggregationView AnswerAnswer: A
Which of the following documents would BEST support this?
The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained . Which of the following documents would BEST support this?A . An incident response planB . A business continuity planC . A change management policyD . An acceptable use policyView...
On which of the following solutions would the technician MOST likely train the employee?
A city has hired a new employee who needs to be able to work when traveling at home and at the municipal sourcing of a neighboring city that snares services. The employee is issued a laptop, and a technician needs to train the employee on the appropriate solutions for secure...