Which of the following is the best option?
A technician is concerned about security and is asked to set up a network management protocol. Which of the
following is the best option?
which of the following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?
which of the following technologies to prevent unauthor…
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from
traversing the firewall?
Which of the following is the malicious student impleme…
A malicious student is blocking mobile devices from connecting to the internet when other students are in the
classroom. Which of the following is the malicious student implementing?
which of the following network segmentation techniques?
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer
3 capable in order to more adequately route packages. This is an example of which of the following network
segmentation techniques?
Which of the following is an addressing scheme that wil…
Ann, a network technician is preparing to configure a company’s network. She has installed a firewall to allow
for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP
address from the internet, but they should be able to communicate with remote networks after receiving a
proper IP address. Which of the following is an addressing scheme that will work in this situation?
Which of the following is a connectionless protocol?
Which of the following is a connectionless protocol? (Select TWO)
Which of the following should be performed to verify th…
A network administrator is following best practices to implement firewalls, patch management and policies on
the network. Which of the following should be performed to verify the security controls in place?
which of the following wireless technologies?
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?
Which of the following should be one FIRST to resolve t…
A customer is attempting to download a file from a remote FTP server, but receives an error that a connection
cannot be opened. Which of the following should be one FIRST to resolve the problem?A. Ensure that port 20 is open