Which of the following performance optimization methods would BEST alleviate network traffic?
An organization finds that most of the outgoing traffic on the network is directed at several Internetsites viewed
by multiple computers simultaneously. Which of the following performance optimization methods would BEST
alleviate network traffic?
Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing
Which of the following settings is incorrect on theclient?
Which of the following most likely describes the issue?
A technician replaces a failed router in an office with the same model unit using the default settings. After the
installation, the technician reboots all of the PCsand servers. Upon reboot some of the PCs are receiving IP
addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as
the servers. Which of the following most likely describes the issue?
which of the following authentication methods was being used?
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72
minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following
authentication methods was being used?
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?
Which of the following can be used to find the key?
A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table
does not contain the key?
Which of the following would MOST likely be installed?
A system administrator is implementing an IDS on the database server to see who is trying to access the
server. The administrator relies on the software provider for what to detect. Which of
the following would MOST likely be installed?