A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A

May 22, 2020 No Comments READ MORE +

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?A . DSLB . POTSC . T1D . DOCSISView AnswerAnswer: C

May 22, 2020 No Comments READ MORE +

Which of the following solution sets properly addresses all of the identified requirements?

An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following: - WLAN architecture supporting speeds in excess of 150 Mbps - Clientless remote network access - Port-based network access control Which of the following solution sets properly addresses all...

May 22, 2020 No Comments READ MORE +

Which of the following is MOST effective in resolving this issue?

A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with a public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random,...

May 22, 2020 No Comments READ MORE +

Which of the following should be changed on the network?

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the...

May 22, 2020 No Comments READ MORE +

Which of the following indicates the correct IP address range?

A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?A . 172.16.80.0-172.16.85.254B . 172.16.80.0-172.16.88.255C . 172.16.80.1-172.16.87.254D . 172.16.80.1-172.16.85.255View AnswerAnswer: C

May 22, 2020 No Comments READ MORE +

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)A . VPN concentratorB . Proxy serverC . Wireless controllerD . RADIUS serverE . Multilayer switchView AnswerAnswer: CD

May 21, 2020 No Comments READ MORE +

Which of the following tools would allow the technician to view the handshake?

A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of...

May 21, 2020 No Comments READ MORE +

Which of the following 802.11 standards provides the MOST bandwidth?

A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?A . aB . acC . gD . nView...

May 21, 2020 No Comments READ MORE +

Which of the following security mechanisms has the technician enforced?

A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?A . DLPB . IDSC . WAFD . WPAE . TPMView AnswerAnswer: C

May 21, 2020 No Comments READ MORE +