Which of the following tasks should be done FIRST?
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)A . Network scanB . Banner grabC . TracertD . DHCP server checkE . Brute-force attackView AnswerAnswer: A,C
When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity?
A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)A . TCP 25B . TCP 110C . TCP 143D . TCP 389E . TCP 587F . TCP...
Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?
A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?A . Use a modem to...
When enabling jumbo frames on a network device, which of the following parameters is being adjusted?
When enabling jumbo frames on a network device, which of the following parameters is being adjusted?A . SpeedB . DuplexC . MTUD . TTLView AnswerAnswer: C
Which of the following indicates the correct IP address range?
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?A . 172.16.80.0-172.16.85.254B . 172.16.80.0-172.16.88.255C . 172.16.80.1-172.16.87.254D . 172.16.80.1-172.16.85.255View AnswerAnswer: C
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A
Which of the following security mechanisms has the technician enforced?
A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?A . DLPB . IDSC . WAFD . WPAE . TPMView AnswerAnswer: C
Which of the following should the technician use to reveal the location of the fault?
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the...
Which of the following connectors does the technician need for this cable?
A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack to connect to the switch on the other side. Which of the following connectors does the technician need for this...
Which of the following should current network performance be compared against to determine network anomalies?
Which of the following should current network performance be compared against to determine network anomalies?A . BaselineB . Traffic analysisC . Packet captureD . LogsView AnswerAnswer: A