which of the following layers of the OSI model was the issue resolved?
A network engineer is dispatched to an employee office to troubleshoot an issue with the
employee’s laptop. The employee is unable to connect to local and remote resources. The network
engineer flips the laptop’s wireless switch on to resolve the issue. At which of the following layers of
the OSI model was the issue resolved?
Which of the following represents a cryptographic solution where the encrypted stream cannot be captured by a
Which of the following represents a cryptographic solution where the encrypted stream cannot be
captured by a sniffer without the integrity of the stream being compromised?
Which of the following commands would provide the BEST information about the path taken across the network to
A network technician has received comments from several users that cannot reach a particular
website. Which of the following commands would provide the BEST information about the path
taken across the network to this website?
Which of the following did the developer MOST likely implement?
A new client application developer wants to ensure that the encrypted passwords that are stored in
their database are secure from cracking attempts. To implement this, the developer implements a
function on the client application that hashes passwords thousands of times prior to being sent to
the database. Which of the following did the developer MOST likely implement?
Which of the following commands would the network technician use to locate this unauthorized computer and dete
A network technician has detected a personal computer that has been physically connected to the
corporate network. Which of the following commands would the network technician use to locate
this unauthorized computer and determine the interface it is connected to?
Which of the following will Joe need to use to BEST accomplish the objective?
Joe must send Ann a message and provide Ann with assurance that he was the actual sender.
Which of the following will Joe need to use to BEST accomplish the objective?
Which of the following would be the result of this action?
A network technician is troubleshooting a problem at a remote site. It has been determined that the
connection from router A to router B is down. The technician at the remote site re-terminates the
CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is
plugged into the correct interface. Which of the following would be the result of this action?
Which of the following would BEST meet this security goal?
A system administrator wants to confidentially send a user name and password list to an individual
outside the company without the information being detected by security controls. Which of the
following would BEST meet this security goal?
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
Which of the following connection types is used to terminate DS3 connections in a
telecommunications facility?
Which of the following will allow the administrator to log onto the firewall via HTTPS…?
After connecting a workstation directly to a small business firewall, a network administrator is trying
to manage it via HTTPS without losing its stored configuration. The only two pieces of information
that the network administrator knows about the firewall are the management interface MAC
address, which is 01:4a:d1:fa:b1:0e, and the administrator’s password. Which of the following will
allow the administrator to log onto the firewall via HTTPS if the management’s IP address is
unknown and the administrator’s workstation IP address is 192.168.0.10/23?