Which of the following would need to be added to the ne…
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the
tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to
allow it to interpret the new device and control it using SNMP?
Which of the following protocols uses an asymmetric key…
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?
Which of the following integrity security mechanisms en…
Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?
Which of the following techniques enables a highly secu…
Which of the following techniques enables a highly secured organization to assess security weaknesses in real time?
which of the following network devices should a network…
A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC’s that do not have wireless
capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the
following network devices should a network technician use to connect all the devices to the wireless network?
what mode?
In order for network monitoring to work properly, you need a PC and a network card running in what mode?
Which of the following would be the BEST example of two…
A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be
the BEST example of two-factor authentication?
Which of the following should be performed to help avoi…
A recent audit of a company’s identity management system shows that 30% of active accounts belong to people no longer with the firm. Which of the following
should be performed to help avoid this scenario? (Select TWO).
Which of the following default ports is associated with…
Which of the following default ports is associated with protocols that are connectionless?
which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following procedures?