Which of the following TCP ports is used by the Windows OS for file sharing?
Which of the following TCP ports is used by the Windows OS for file sharing?A . 53B . 389C . 445D . 1433View AnswerAnswer: C Explanation: TCP port 445 is used by the Windows OS for file sharing. It is also known as SMB (Server Message Block) or CIFS (Common...
Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...
Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?A . 2.4GHzB . 5GHzC . 6GHzD . 900MHzView...
Which of the following is the MOST likely cause of this issue?
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?A . The link is improperly terminatedB . One of the devices...
Which of the following commands should the technician run?
A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?A . ipconfigB . nslookupC . arpD . routeView AnswerAnswer: B Explanation: The nslookup command should be run to confirm...
Which of the following describes the reason why the events are not being received?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are...
Which of the following attack types BEST describes this action?
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attackB . Rainbow table attackC . Brute-force attackD . Dictionary attackView AnswerAnswer: D Explanation: The...
Which of the following ports should be blocked when checking firewall configuration?
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22B . 23C . 80D . 3389E . 8080View AnswerAnswer: B Explanation: Port 23 should be blocked...
Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?
A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?A . CDMAB . CSMA/CDC . CSMA/CAD . GSMView AnswerAnswer: C Explanation: CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is an...
You are tasked with verifying the following requirements are met in order to ensure network security.
You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic...