The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:A . penetration testingB . vulnerability scanningC . reconnaissanceD . social engineeringView AnswerAnswer: A
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?A . Straight-throughB . ConsoleC . RolloverD . CrossoverView AnswerAnswer: D
Which of the following steps would MOST likely correct this issue?
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPsec tunnels. A network administrator notices that a worm that was not...
To verify the configuration of the router, which of the following tools should the technician use?
A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?A . Loopback adapterB . Cable testerC . Tone generatorD ....
Which of the following should the network team implement to fulfil the request?
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?A . Proxy serverB . UTM applianceC . Content filterD...
Which of the following provides the ability to deploy consistent access point configurations from a central location?
Which of the following provides the ability to deploy consistent access point configurations from a central location?A . Wireless controllerB . AAA serverC . WiFi-protected setupD . Proxy serverE . VPN concentratorView AnswerAnswer: A
Which of the following should the technician perform to discover possible interference?
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?A . Site surveyB . Vulnerability scanningC . WardrivingD . Checking logical diagramE . Bandwidth testView AnswerAnswer:...
Which of the following would allow SSH to function properly?
A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?A . Perform file hashingB . Generate...
Which of the following should the technician choose that all the equipment would support?
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the...
Which of the following BEST describes the purpose of this device?
A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the database server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the purpose of this device?A...