Which of the following attack types BEST describes this action?

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D Explanation: The...

August 15, 2023 No Comments READ MORE +

Which of the following will allow the technician to record these changes?

A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?A . Asset tags B. A smart locker C. An access control...

August 15, 2023 No Comments READ MORE +

Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?A . 2.4GHz B. 5GHz C. 6GHz D. 900MHzView...

August 15, 2023 No Comments READ MORE +

Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?

Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?A . PaaS B. IaaS C. SaaS D. Disaster recovery as a Service (DRaaS)View AnswerAnswer: B Explanation: IaaS stands for Infrastructure as a Service, which is a cloud service model that provides...

August 15, 2023 No Comments READ MORE +

Which of the following antenna types should the AP utilize?

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?A . Omni B. Directional C. Yagi D. ParabolicView AnswerAnswer: A Explanation: An omni antenna should be used by...

August 15, 2023 No Comments READ MORE +

Which of the following TCP ports is used by the Windows OS for file sharing?

Which of the following TCP ports is used by the Windows OS for file sharing?A . 53 B. 389 C. 445 D. 1433View AnswerAnswer: C Explanation: TCP port 445 is used by the Windows OS for file sharing. It is also known as SMB (Server Message Block) or CIFS (Common...

August 14, 2023 No Comments READ MORE +

Which of the following is the physical topology for an Ethernet LAN?

Which of the following is the physical topology for an Ethernet LAN?A . Bus B. Ring C. Mesh D. StarView AnswerAnswer: D Explanation: In a star topology, all devices on a network connect to a central hub or switch, which acts as a common connection point. Ethernet LANs typically use...

August 14, 2023 No Comments READ MORE +

Which of the following methods should the engineer select?

Must be vendor neutral Which of the following methods should the engineer select?A . TWP-RC4 B. CCMP-AES C. EAP-TLS D. WPA2View AnswerAnswer: C Explanation: EAP-TLS is the method that should be selected to meet the requirements for designing a new secure wireless network. EAP-TLS (Extensible Authentication Protocol - Transport Layer...

August 14, 2023 No Comments READ MORE +

Which of the following would MOST likely be used to review previous upgrades to a system?

Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity plan B. Change management C. System life cycle D. Standard operating proceduresView AnswerAnswer: B Explanation: Change management is the process of reviewing previous upgrades to a system. It is a systematic...

August 14, 2023 No Comments READ MORE +

Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...

August 14, 2023 No Comments READ MORE +