Which of the following will allow the request to be fulfilled without breaking the corporate policy?

An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?A . DHCP relayB . DHCP exclusionC...

October 14, 2020 No Comments READ MORE +

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?A . DSLB . POTSC . T1D . DOCSISView AnswerAnswer: C

October 14, 2020 No Comments READ MORE +

Which of the following should the network technician use to help identify the appropriate cable?

A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?A . Tone generatorB . MultimeterC ....

October 14, 2020 No Comments READ MORE +

Which of the following should the technician perform to discover possible interference?

A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?A . Site surveyB . Vulnerability scanningC . WardrivingD . Checking logical diagramE . Bandwidth testView AnswerAnswer:...

October 14, 2020 No Comments READ MORE +

Which of the following is MOST likely the cause?

A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is...

October 14, 2020 No Comments READ MORE +

Which of the following should the technician use to determine which statistics are not in the normal range?

A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician use to determine which statistics are not in the normal range?A . Baseline reviewB . Vulnerability scanC . System life-cycle reportD . Archiving logsView AnswerAnswer: A

October 14, 2020 No Comments READ MORE +

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:A . penetration testingB . vulnerability scanningC . reconnaissanceD . social engineeringView AnswerAnswer: A

October 13, 2020 No Comments READ MORE +

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A

October 13, 2020 No Comments READ MORE +

Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?

Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?A . NDAB . IRPC . BYODD . SLAView AnswerAnswer: C

October 13, 2020 No Comments READ MORE +

Which of the following would BEST assist in recovering these devices?

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?A . Asset tracking tagsB . Motion detectorsC . Security guardsD . Computer locksView AnswerAnswer: D

October 13, 2020 No Comments READ MORE +