Which of the following is used to track and document various types of known vulnerabilities?
Which of the following is used to track and document various types of known vulnerabilities?A . CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilegeView AnswerAnswer: A Explanation: CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to...
Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?A . Coaxial B. Single-mode fiber C. Cat 6e D. Multimode fiberView AnswerAnswer: A Explanation: Coaxial cable is a type of cable...
Which of the following tools should the technician use to troubleshoot the issue?
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference...
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switch B. VPN headend C. Next-generation firewall D. Proxy server E. Intrusion preventionView AnswerAnswer: C Explanation: Next-generation firewalls can provide content filtering and threat protection, and can...
Which of the following should the engineer enable to prevent network stability issues?
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?A . 802.1Q B. STP C. Flow control D. CSMA/CDView AnswerAnswer: B Explanation: Spanning Tree Protocol (STP) should be enabled when configuring redundant network links between switches. STP ensures...
Which of the following systems would MOST likely be found in a screened subnet?
Which of the following systems would MOST likely be found in a screened subnet?A . RADIUS B. FTP C. SQL D. LDAPView AnswerAnswer: B Explanation: FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a...
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?A . NIC teaming B. Load balancer C. RAID array D. PDUsView AnswerAnswer: A Explanation: NIC teaming, also known as...
Which of the following BEST describes this deployment?
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?A . Extended service set B. Basic service set C. Unified service set...
Which of the following metrics will MOST accurately show the underlying performance issues?
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usage B....
Which of the following routing protocols is used to exchange route information between public autonomous systems?
Which of the following routing protocols is used to exchange route information between public autonomous systems?A . OSPF B. BGP C. EGRIP D. RIPView AnswerAnswer: B