which of the following places of the OSI model would a …
When a client calls and describes a problem with a computer not being able to reach the Internet, in which of
the following places of the OSI model would a technician begin troubleshooting?
Which of the following would be used in forensic analys…
Which of the following would be used in forensic analysis of a compromised Linux system? (Select THREE).
which the malicious user gained access to the switches?
Two weeks after installation, a network technician is now unable to log onto any of the newly installed company
switches. The technician suspects that a malicious user may have changed the switches’ settings before they
were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained
access to the switches?
which of the following strategies should be employed?
The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15%
per year in each of the last four years, but that this year’s growth has slowed to around 7%. Over the same timeperiod, the number of attacks against applications has decreased or stayed flat each year. At the start of the
measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago,
the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would
seem to suggest which of the following strategies should be employed?
Which of the following should the technician do NEXT in…
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue
DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the
following should the technician do NEXT in the troubleshooting methodology?
Which of the following is MOST likely the cause of the …
A PC technician has installed a new network printer that was preconfigured with the correct static IP address,
subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity,but the printer will not respond to any network communication attempts. Which of the following is MOST likely
the cause of the problem?
Which of the following should be implemented to securel…
A technician wants to securely manage several remote network devices. Which of the following should be
implemented to securely manage the devices?
Which of the following could the technician do for vend…
A network technician has set up an FTP server for the company to distribute software updates for their
products. Each vendor is provided with a unique username and password for security. Several vendors have
discovered a virus in one of the security updates. The company tested all files before uploading them but
retested the file and found the virus. Which of the following could the technician do for vendors to validate the
proper security patch?
Which of the following is evidence that would aid Ann i…
A security analyst, Ann, states that she believes Internet facing file transfer servers are being attacked. Which
of the following is evidence that would aid Ann in making a case to management that action needs to be taken
to safeguard these servers?
which of the following?
Before logging into the company network, users are required to sign a document that is to be stored in their
personnel file. This standards and policies document is usually called which of the following?
