Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?

Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?A . Vulnerability assessment B. Factory reset C. Firmware update D. Screened subnetView AnswerAnswer: C

December 26, 2022 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?A...

December 26, 2022 No Comments READ MORE +

Which of the following is used to track and document various types of known vulnerabilities?

Which of the following is used to track and document various types of known vulnerabilities?A . CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilegeView AnswerAnswer: A

December 26, 2022 No Comments READ MORE +

Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?A . 2.4GHz B. 5GHz C. 6GHz D. 900MHzView...

December 26, 2022 No Comments READ MORE +

Which of the following would be BEST for the technician to use to perform this task?

A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?A . RDP B. SSH C. FTP D. DNSView AnswerAnswer: A

December 26, 2022 No Comments READ MORE +

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switch B. VPN headend C. Next-generation firewall D. Proxy server E. Intrusion preventionView AnswerAnswer: C

December 25, 2022 No Comments READ MORE +

Which of the following connector types would have the MOST flexibility?

Which of the following connector types would have the MOST flexibility?A . SFP B. BNC C. LC D. RJ45View AnswerAnswer: A

December 25, 2022 No Comments READ MORE +

Which of the following commands should the technician run?

A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?A . ipconfig B. nslookup C. arp D. routeView AnswerAnswer: B

December 25, 2022 No Comments READ MORE +

Which of the following would be BEST to use to stop this from happening without physically removing the WAP?

A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?A . Password complexity B. Port security C. Wireless client isolation D. Secure SNMPView AnswerAnswer:...

December 25, 2022 No Comments READ MORE +

Which of the following should the systems administrator select to meet this requirement?

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?A . 802.11ac B. 802.11ax C....

December 25, 2022 No Comments READ MORE +