which has been made to look as though it belongs to the…
Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
which of the following conditions?
When installing a network cable with multiple strands, a technician drags the cable past a sharp edge and exposes the copper conductor on several wires. These exposed wires come into contact with each other forming an electrical connection.
This creates which of the following conditions?
The used has MOST likely:
A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office.
The used has MOST likely:
Which of the following network devices will need to be …
A network administrator wants to logically separate web function servers on the network.
Which of the following network devices will need to be configured?
Which of the following encryption types should be imple…
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server.
Which of the following encryption types should be implemented?
Which of the following is the MOST likely cause?
After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting. When the technician relocates the equipment back to the previous space, the phone functions properly. No other stations are being affected.
Which of the following is the MOST likely cause?
Which of the following commands should the technician u…
A network technician determines that two dynamically assigned workstations have duplicate IP addresses.
Which of the following commands should the technician use to correct this problem?
Which of the following will allow SNMP monitoring of th…
A technician needs to use SNMP to manage several legacy devices. The technician wants to ask the vendor for specification that will provide SNMP monitoring of the devices.
Which of the following will allow SNMP monitoring of the devices?
Which of the following should be created?
A network technician wants to create a network where consultants can go to access the Internet without disrupting the intranet of the office.
Which of the following should be created?
Which of the following was MOST likely used by the tech…
When troubleshooting a T1 connection, the support representative from the provider instructs a technician to place a special device into the CSU/DSU. Using this device the provider is able to verify that communications are reaching the CSU/DSU.
Which of the following was MOST likely used by the technician?