The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?
The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?A . Quarantine networkB . Persistent agentsC . Posture assessmentD . Non-persistent agentsView AnswerAnswer: C Explanation: Network Admission Control (NAC) can...
Which of the following would the technician MOST likely configure?
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?A . Hardware firewallB . Proxy serverC . Software firewallD . GRE tunnelingView AnswerAnswer: C Explanation: A...
Which of the following tools can be used to locate its physical location within the wall?
A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall?A . Cable certifierB . MultimeterC . Cable testerD...
Which of the following should the network technician do NEXT?
Topic 4, Troubleshooting A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A . Establish a theory of probable cause.B . Document actions and findings.C . Determine next steps...
Which of the following network topologies has a central, single point of failure?
Which of the following network topologies has a central, single point of failure?A . RingB . StarC . HybridD . MeshView AnswerAnswer: B Explanation: A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form...
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Which of the following physical security controls prevents an attacker from gaining access to a network closet?A . CCTVsB . Proximity readersC . Motion sensorsD . IP camerasView AnswerAnswer: B Explanation: A proximity card is a physical card which used to get access to a physical area such as a...
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?A . The VoIP phone would request a new phone number from the unified communications server.B . The VoIP phone...
Which of the following would BEST handle the rerouting caused by the disruption of service?
The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?A . Layer 3 switchB . Proxy serverC . Layer 2 switchD . Smart...
Which of the following would be identified as physical security controls?
During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).A . RSAB . PasswordsC . Man trapsD . BiometricsE ....
An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?
An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?A . The OSPF not-so-stubby...