Which of the following is a vulnerable system designed to detect and log unauthorized access?
Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B
Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?
A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?A . Use a modem to...
Which of the following should the technician do FIRST to reconnect the server to the network?
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the...
Which of the following could cause this condition?
An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause...
Which of the following should the network team implement to fulfil the request?
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?A . Proxy serverB . UTM applianceC . Content filterD...
Which of the following has the user MOST likely introduced to the network?
A network technician receives a call from a user who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced...
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?A . Guests should log into a separate wireless...
Which of the following policies should be followed?
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?A . Change management policyB . Remote access policyC . Acceptable use policyD . Memorandum of understandingView AnswerAnswer: A
Which of the following should the technician use to reveal the location of the fault?
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the...
Which of the following tools would allow the technician to view the handshake?
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of...