Which of the following is being implemented?
A network administrator has decided to tighten company security after a recent data breach. The
new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use
dynamic token that is accessed via a smartphone application. Which of the following is being
implemented?
Which of the following is represented by this addressing scheme?
A technician has set up a wired network IP scheme with the following specifications:
DHCP: 192.168.1.100-150
Gateway: 192.168.1.1
DNS: 192.168.1.1
Which of the following is represented by this addressing scheme?
which of the following?
A technician enters a username and password once and can access multiple databases without being
prompted to reenter their password. This is an example of which of the following?
Which of the following threats did the network technician find?
A network technician is doing a wireless audit and finds an SSID that does not match the company’s
SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of
the following threats did the network technician find?
They are evaluating the feasibility of implementing WP
A technician needs to install a new wireless encryption system. They are evaluating the feasibility of
implementing WP
Which of the following would be used?
A network administrator wants to perform a test to see if any systems are passing clear text through
the network. Which of the following would be used?
Which of the following would allow the network administrator to collect log files on a centralized host?
A network administrator currently collects log files from several different servers. Which of the
following would allow the network administrator to collect log files on a centralized host?
Which of the following should the technician do NEXT?
A number of remote users have reported being unable to securely log on to the company’s network.
Upon speaking with some of the employees experiencing the issue, no changes were made to their
configurations, usernames, or passwords. The technician establishes a theory that one of the VPN
concentrators may be down. Which of the following should the technician do NEXT?
Which of the following network topologies is ONLY possible between two users?
Which of the following network topologies is ONLY possible between two users?
which action should the technician take to correct Ann’s problem?
Ann, a new user, is unable to communicate on the network from her computer. A technician has
verified that the cables are functioning properly. Based on the information below, which action
should the technician take to correct Ann’s problem?
Computer_A Switch_A
IP: 10.0.0.60 Int VLAN10
SM: 255.255.255.0 IP address 10.0.0.1/28
GW: 10.0.0.1 Speed 100 Duplex Full