Which of the following needs to be rolled back?
Upon arrival at work, an administrator is informed that network users cannot access the file server. The
administrator logs onto the server and sees the updates were automatically installed and the network
connection shows limited and no availability. Which of the following needs to be rolled back?
Which of the following standards requires the use of 5 …
A network administrator wants to deploy a wireless network in a location that has too much RF interference at
2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (SelectTWO)
Which of the following is the MOST likely cause?
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables
have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an
optical power meter to confirm that light is passing in both directions without excessive loss. Which of the
following is the MOST likely cause?
which of the following should the technician perform to…
A network technician is using telnet to connect to a router on a network that has been compromised. A new
user and password has been added to the router with full rights. The technician is concerned that the regularly
used administrator account has been compromised. After changing the password on all networking devices,
which of the following should the technician perform to prevent the password for the administrator account from
being sniffed on the network?
Which of the following features on the switch should th…
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs tobe configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which
of the following features on the switch should the network administrator use?
Which of the following should Ann perform to test wheth…
Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the
following HTTP request:
POST /login.aspx HTTP/1.1
Host: comptia.org
Content-type: text/html
txtUsername=ann&txtPassword=ann&alreadyLoggedIn=false&submit=true
Which of the following should Ann perform to test whether the website is susceptible to a simple authentication
bypass?
Which of the following technologies would be able to de…
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the
following technologies would be able to detect and block this traffic?
Which of the following cloud infrastructure designs inc…
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog
server that is hosted at a third party organization for review?
Which of the following are security weaknesses in this …
A penetration tester is inspecting traffic on a new mobile banking application and sends the following web
request:
POST http://www.example.com/resources/NewBankAccount HTTP/1.1 Content-type: application/json
{
“account”:
[
{ “creditAccount”:”Credit Card Rewards account”}
{ “salesLeadRef”:”www.example.com/badcontent/exploitme.exe”} ],
“customer”:
[
{ “name”:”Joe Citizen”} { “custRef”:”3153151″}
]}
The banking website responds with:
HTTP/1.1 200 OK
{
“newAccountDetails”:
[
{ “cardNumber”:”1234123412341234″} { “cardExpiry”:”2020-12-31″} { “cardCVV”:”909″}
],
“marketingCookieTracker”:”JSESSIONID=000000001″
“returnCode”:”Account added successfully”
}
Which of the following are security weaknesses in this example? (Select TWO).
which of the following attacks?
A network administrator receives a call asking for assistance with connecting to the network. The user asks for
the IP address, subnet class, and VLAN required to access the network. This describes which of the following
attacks?