Which of the following is being implemented?
A network administrator has decided to tighten company security after a recent data breach. The
new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time
use dynamic token that is accessed via a smartphone application. Which of the following is being
implemented?
Which of the following is represented by this addressing scheme?
A technician has set up a wired network IP scheme with the following specifications:
DHCP: 192.168.1.100-150
Gateway: 192.168.1.1
DNS: 192.168.1.1
Which of the following is represented by this addressing scheme?
Which of following types of authentication is this an example of?
A technician needs to enter a username and password and have their fingerprint scanned to
access a server. Which of following types of authentication is this an example of?
which of the following?
A technician enters a username and password once and can access multiple databases without
being prompted to reenter their password. This is an example of which of the following?
Which of the following is this an example of?
A company has a server with redundant power supplies. Which of the following is this an example
of?
which of the following is MOST likely to be implemented on these new switches?
A network administrator is replacing old switches to support a VoIP deployment. Based on this
parameter, which of the following is MOST likely to be implemented on these new switches?
Which of the following MOST likely caused the loss of Internet connectivity?
A network administrator has just been notified about the loss of Internet connectivity. Another
technician had just performed non-scheduled maintenance and mentioned that some cabling may
have been moved. Which of the following MOST likely caused the loss of Internet connectivity?
Which of the following protocols would the network administrator use to protect login credentials when accessi
Which of the following protocols would the network administrator use to protect login credentials
when accessing a router terminal session?
Which of the following threats did the network technician find?
A network technician is doing a wireless audit and finds an SSID that does not match the
company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is
Default. Which of the following threats did the network technician find?
Which of the following should the administrator do NEXT?
A network administrator notices that load balancing is not working properly on the web cluster as
previously configured. In speaking with management, a change to the IP addressing scheme was
made yesterday which possibly affected one member of the cluster. Due to the timing of the
events, the administrator theorizes that this change caused the problem. Which of the following
should the administrator do NEXT?