Which of the following would MOST likely be used to review previous upgrades to a system?
Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity plan B. Change management C. System life cycle D. Standard operating proceduresView AnswerAnswer: B
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSO B. TACACS+ C. Zero Trust D. Separation of duties E. Multifactor authenticationView AnswerAnswer: B
Within the realm of network security, Zero Trust:
Within the realm of network security, Zero Trust:A . prevents attackers from moving laterally through a system. B. allows a server to communicate with outside networks without a firewall. C. block malicious software that is too new to be found in virus definitions. D. stops infected files from being downloaded...
Which of the following attack types BEST describes this action?
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D
Which of the following would be MOST affected by this statistic?
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?A . A VoIP sales call with a...
Which of the following metrics confirms there is a cabling issue?
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...
Which of the following steps will MOST likely determine the cause of the issue?
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the...
To which of the following addresses should the software be configured to send the query?
A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?A . 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31View AnswerAnswer:...
Which of the following subnets should the technician use?
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?A . 255.255.128.0 B. 255.255.192.0 C. 255.255.240.0 D. 255.255.248.0View AnswerAnswer: C
Which of the following is the MOST likely cause of this issue?
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?A . The link is improperly terminated B. One of the devices...