Which of the following items will Jeff need?
A small office has asked to have six PCs networked together by Jeff, a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will Jeff need? (Select TWO).
which of the following?
PKI is a method of user authentication which uses which of the following?
Which of the following is MOST likely causing the issue?
Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The companys Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue?
which of the following network scanners to see the protocols that are being used?
Kim and Zach, attackers, use which of the following network scanners to see the protocols that are
being used? (Select TWO).
Which of the following would allow a packet sniffer to do this?
Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
Which of the following tools did the attackers MOST likely use to accomplish this?
Lisa, an administrator, believes that the network has been attacked and MAC addresses have
been captured allowing unauthorized computers to access the network. Which of the following
tools did the attackers MOST likely use to accomplish this?
Which of the following DNS record types will be used for mail transfer if the MX record is not found?
Which of the following DNS record types will be used for mail transfer if the MX record is not found?
Which of the following BEST describes this scenario?
Lisa, an administrator, believes that the network has been attacked and there is no known
definition or prevention method to help avoid this attack. Which of the following BEST describes
this scenario?
Which of the following could be done together to solve this problem?
Jeff, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal.
Which of the following could be done together to solve this problem? (Select TWO).
Which of the following tools should she use?
Kim, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?