Which of the following should the network technician do…
A network technician is using a network monitoring system and notices that every device on a particular
segment has lost connectivity. Which of the following should the network technician do NEXT?
Which of the following should be the FIRST question the…
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it.
However, his colleagues are able to print their documents to the same shared printer. Which of the following
should be the FIRST question the helpdesk asks?
Which of the following should an administrator implemen…
A company has had several virus infections over the past few months. The infections were caused by
vulnerabilities in the application versions that are being used. Which of the following should an administrator
implement to prevent future outbreaks?
Which of the following was MOST likely installed that r…
When configuring a new server, a technician requests that an MX record be created in DNS for the new server,
but the record was not entered properly. Which of the following was MOST likely installed that required an MX
record to function properly?
which of the following?
An organization requires a second technician to verify changes before applying them to network devices. When
checking the configuration of a network device, a technician determines that a coworker has improperly
configured the AS number on the device. This would result in which of the following?
Which of the following is causing this issue?
A technician is troubleshooting a wired device on the network. The technician notices that the link light on the
NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully.
Which of the following is causing this issue?
Which of the following security assessment methods are …
The following has been discovered in an internally developed application:
Error – Memory allocated but not freed:
char *myBuffer = malloc(BUFFER_SIZE);
if (myBuffer != NULL) {
*myBuffer = STRING_WELCOME_MESSAGE;
printf(“Welcome to: %s\\n”, myBuffer);
}
exit(0);
Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO).
Which of the following is MOST likely the issue?
While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop
and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
Which of the following is the MOST likely cause of this…
A network technician has been assigned to install an additional router on a wireless network. The router has a
different SSID and frequency. All users on the new access point and the main network can ping each other and
utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is
the MOST likely cause of this issue?
Which of the following is occurring on the network?
The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance
department. The following information is compiled:
Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
All callers are connected to the same switch and are routed by a router with five built-in interfaces. The
upstream router interface’s MAC is 00-01-42-32-ab-1a
A packet capture shows the following:
09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2305, seq 1, length 6553409:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2306, seq 2, length 65534
09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2307, seq 3, length 65534
Which of the following is occurring on the network?