Which of the following should the technician do NEXT in the troubleshooting methodology?

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...

October 5, 2018 No Comments READ MORE +

Which of the following concepts are MOST important for a company's long term health in the event of a disaster?

Topic 3, Network security Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO).A . RedundancyB . Implementing acceptable use policyC . Offsite backupsD . Uninterruptable power suppliesE . Vulnerability scanningView AnswerAnswer: A,C Explanation: In case of disaster...

October 4, 2018 No Comments READ MORE +

Given this output, which of the following has the technician learned about the wireless network?

11 auth:open link auth:wpa2-psk BSSID:0F:33:AE:F1:02:0A SSID:CafeWireless Channel:149,1 Given this output, which of the following has the technician learned about the wireless network? (Select TWO).A . The WAP is using RC4 encryptionB . The WAP is using 802.11aC . The WAP is using AES encryptionD . The WAP is using the...

October 3, 2018 No Comments READ MORE +

Which of the following describes a smurf attack?

Which of the following describes a smurf attack?A . Attack on a target using spoofed ICMP packets to flood itB . Intercepting traffic intended for a target and redirecting it to anotherC . Spoofed VLAN tags used to bypass authenticationD . Forging tags to bypass QoS policies in order to...

October 2, 2018 No Comments READ MORE +

Which of the following should the technician do NEXT in the troubleshooting methodology?

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...

October 1, 2018 No Comments READ MORE +

Which of the following should be considered FIRST?

A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST?A . Compatibility requirementsB . Environment limitationsC . Cable lengthD . Equipment limitationsView AnswerAnswer: B Explanation: SOHO stands for Small Office / Home Office. A SOHO network istypically a small network....

September 30, 2018 No Comments READ MORE +

Which of the following options would satisfy these requirements?

Topic 1, Network architecture A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?A . Add a router and enable OSPC . Add a layer 3 switch and create...

September 27, 2018 No Comments READ MORE +

Which of the following network devices use ACLs to prevent unauthorized access into company systems?

Which of the following network devices use ACLs to prevent unauthorized access into company systems?A . IDSB . FirewallC . Content filterD . Load balancerView AnswerAnswer: B Explanation: A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls arefrequently used to prevent unauthorized...

September 26, 2018 No Comments READ MORE +

Which of the following is causing this issue?

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue?A . EMIB . RFIC . Cross-talkD...

September 22, 2018 No Comments READ MORE +

Which of the following has MOST likely been implemented at the site with the fewest security issues?

An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. Which of the following has MOST likely been implemented at the site with...

September 19, 2018 No Comments READ MORE +