which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?
Which of the following is the BEST approach for impleme…
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is used by several employees.
Which of the following is the BEST approach for implementation of the new application on the virtual server?
Which of the following antenna types is BEST suited for…
A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small
physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution?
which of the following practices?
Identifying a list of all approved software on a system is a step in which of the following practices?
Which of the following allows 802.11n to reach higher s…
A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The
technician has recommended an 802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and
connecting to an external website over port 443. This Telnet service was found by comparing the system’s services to the list of standard services on the
company’s system image. This review process depends on:
Which of the following should be done to correct this issue?
Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can
be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue?
Which of the following would be the MOST appropriate?
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).
Which of the following is the MOST likely reason for th…
A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do
so with a local user account. Which of the following is the MOST likely reason for the problem?
Which of the following can be used as an equipment thef…
Which of the following can be used as an equipment theft deterrent?