Which of the following is a vulnerable system designed to detect and log unauthorized access?

Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B

October 18, 2020 No Comments READ MORE +

Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?

A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?A . Use a modem to...

October 18, 2020 No Comments READ MORE +

Which of the following should the technician do FIRST to reconnect the server to the network?

After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the...

October 17, 2020 No Comments READ MORE +

Which of the following could cause this condition?

An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause...

October 17, 2020 No Comments READ MORE +

Which of the following should the network team implement to fulfil the request?

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?A . Proxy serverB . UTM applianceC . Content filterD...

October 17, 2020 No Comments READ MORE +

Which of the following has the user MOST likely introduced to the network?

A network technician receives a call from a user who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced...

October 17, 2020 No Comments READ MORE +

Which of the following represents the MOST secure method to configure guest access to the wireless network?

A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?A . Guests should log into a separate wireless...

October 17, 2020 No Comments READ MORE +

Which of the following policies should be followed?

A technician discovers that multiple switches require a major update. Which of the following policies should be followed?A . Change management policyB . Remote access policyC . Acceptable use policyD . Memorandum of understandingView AnswerAnswer: A

October 17, 2020 No Comments READ MORE +

Which of the following should the technician use to reveal the location of the fault?

A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the...

October 16, 2020 No Comments READ MORE +

Which of the following tools would allow the technician to view the handshake?

A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of...

October 16, 2020 No Comments READ MORE +