Which of the following tools could attempt to detect operating system vulnerabilities?
Which of the following tools could attempt to detect operating system vulnerabilities?
Which of the following is the BEST option for connectivity?
A company has one public IP address, and only one device needs to be able to connect to the
Internet at a time. Which of the following is the BEST option for connectivity?
which of the following?
An IP address assigned from a DHCP server is said to be which of the following?
Which of the following would BEST fit the needs of this office?
A technician needs to setup an Internet connection for a small office. There are five users that
need the ability to use email and do online research. The office manager wants the connection to
be always on and be as inexpensive as possible. Which of the following would BEST fit the needs
of this office?
Which of the following fiber types should be installed?
The network technician needs to install fiber cabling to connect two buildings less than 984 feet
(300 meters) apart. Which of the following fiber types should be installed?
Which of the following protocols does DNS utilize on port 53?
Which of the following protocols does DNS utilize on port 53?
which of the following layers do IP addresses exist?
At which of the following layers do IP addresses exist?
Which of the following encryption types should the technician select?
A network technician has a RADIUS server IP address that must be included as part of the
security settings for a WAP. Which of the following encryption types should the technician select?
Which of the following reside at a minimum of Layer 3 of the OSI model?
Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO).
Which of the following is the correct firewall rule?
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with
the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?