Which of the following attacks did the network administrator prevent?
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twinB . TailgatingC . PiggybackingD . Shoulder surfingView AnswerAnswer: B Explanation: Tailgating...
Which of the following policies should the network administrator implements to BEST mitigate this issue?
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portalB . Two-factor authenticationC . Complex passwordsD . GeofencingE . Role-based accessF . Explicit denyView...
Which of the following should a network administrator configure to BEST prevent unauthorized access?
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...
Which of the following methods should the engineer select?
Must be vendor neutral Which of the following methods should the engineer select?A . TWP-RC4B . CCMP-AESC . EAP-TLSD . WPA2View AnswerAnswer: C Explanation: EAP-TLS is the method that should be selected to meet the requirements for designing a new secure wireless network. EAP-TLS (Extensible Authentication Protocol - Transport Layer...
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSOB . TACACS+C . Zero TrustD . Separation of dutiesE . Multifactor authenticationView AnswerAnswer: B Explanation: TACACS+ (Terminal Access Controller Access Control System Plus) can be used to...
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G ....
Which of the following software tools would BEST assist the technician in completing this task?
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?A . IP scannerB . Terminal emulatorC . NetFlow analyzerD . Port scannerView AnswerAnswer: A Explanation: To find all devices connected within...
Which of the following will MOST likely replace all the company’s hubs?
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?A . A Layer 3 switchB . A proxy serverC . A NGFWD . A WLAN controllerView AnswerAnswer: A Explanation: A Layer 3 switch will likely...
Which of the following would be BEST to use to detect a MAC spoofing attack?
Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message ProtocolB . Reverse Address Resolution ProtocolC . Dynamic Host Configuration ProtocolD . Internet Message Access ProtocolView AnswerAnswer: B Explanation: Reverse Address Resolution Protocol (RARP) is a protocol that allows a device...
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?A . FirewallB . APC . Proxy serverD . IDSView AnswerAnswer: D Explanation: IDS stands for intrusion detection system, which is a network appliance that monitors network traffic and alerts administrators of...