Which of the following factors will the administrator consider when deciding on the appropriate backup medium?

Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization’s need.

Which of the following factors will the administrator consider when deciding on the appropriate backup medium?
A . Capability
B. Accountability
C. Extensibility
D. Reliability

Answer: A,C,D

What does this source address signify?

Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21.

What does this source address signify?
A . This address means that the source is using an IPv6 address and is spoofed and signifies an IPv4 address of 127.0.0.1.
B. This source address is IPv6 and translates as 13.1.68.3
C. This source address signifies that the originator is using 802dot1x to try and penetrate into Frank’s network
D. This means that the source is using IPv4

Answer: D

Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?

John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization’s network.

Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?
A . Tcp.flags==0x2b
B. Tcp.flags=0x00
C. Tcp.options.mss_val<1460
D. Tcp.options.wscale_val==20

Answer: A,B,C

What is the first step they should do to create the network vulnerability assessment plan?

Smith is an IT technician that has been appointed to his company’s network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed.

What is the first step they should do to create the network vulnerability assessment plan?
A . Their first step is to analyze the data they have currently gathered from the company or interviews.
B. Their first step is to make a hypothesis of what their final findings will be.
C. Their first step is to create an initial Executive report to show the management team.
D. Their first step is the acquisition of required documents, reviewing of security policies and compliance.

Answer: D

Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.

Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.
A . Hybrid virtualization
B. Hardware-assisted virtualization
C. Full virtualization
D. Para virtualization

Answer: B