Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations.
Which of the following standards should be consulted? listening to the emanations. Tempest rooms are designed to keep emanations contained in that room to increase security of data communications happening there.
Which of the following is the BEST explanation that des…
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server.
Which of the following is the BEST explanation that describes this scenario? has been compromised. other machines to compromise
which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks? to traffic on other VLANs that would normally not be accessible.
Which of the following attacks is the user MOST likely …
A malicious user floods a switch with frames hoping to redirect traffic to the user’s server.Which of the following attacks is the user MOST likely using? hacker’s known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker’s computer first instead of sending it to the original destination.
Which of the following describes a smurf attack?
Which of the following describes a smurf attack? using an IP Broadcast address. number of machines on the network that receive and respond to these packets is very large, the victim’s computer will be flooded with traffic. This can slow down the victim’s computer to the point where it becomes impossible to work on.
Which of the following would be an appropriate suggesti…
A network technician is assisting the company with developing a new business continuity plan.
Which of the following would be an appropriate suggestion to add to the plan? functions continue to operate during and after a disaster. unavailable during a disaster.
Which of the following technologies is designed to keep…
Which of the following technologies is designed to keep systems uptime running in the event of a disaster? through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore,
Which of the following has MOST likely been implemented…
An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies.
Which of the following has MOST likely been implemented at the site with the fewest security issues? implement.
Which of the following concepts are MOST important for …
Which of the following concepts are MOST important for a company’s long term health in the event of a disaster? (Select TWO). include: backups made to disk on-site and automatically copied to off-site disk, or made directly to off-site disk the use of high availability systems which keep both the data and system replicated off-site (making the main site redundant), enabling continuous access to systems and data, even after a disaster.
Which of the following antenna types is BEST suited for…
A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building.
Which of the following antenna types is BEST suited for this solution? antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern.