Which of the following layers of the OSI model is responsible for stripping the TCP port information before se
Which of the following layers of the OSI model is responsible for stripping the TCP port information
before sending the packet up to the next layer?
Which of the following services is required on the network firewall to ensure connectivity?
An organization only has a single public IP address and needs to host a website for its customers.
Which of the following services is required on the network firewall to ensure connectivity?
which of the following?
A user reports sporadic network outages. The user tells the administrator it happens after
approximately 20 minutes of work on an application. The administrator should begin
troubleshooting by checking which of the following?
which of the following ports by default?
The protocol SNMP uses which of the following ports by default?
which of the following would MOST likely prevent an unauthorized device from getting onto the network?
If a wireless key gets compromised, which of the following would MOST likely prevent an
unauthorized device from getting onto the network?
Which of the following would a network administrator MOST likely use to actively discover unsecure services ru
Which of the following would a network administrator MOST likely use to actively discover
unsecure services running on a company’s network?
Which of the following IP address/CIDR combinations represent public address space?
Which of the following IP address/CIDR combinations represent public address space? (Select
TWO).
Which of the following is the BEST option for connectivity?
A company has a total of two public IP addresses and must allow 150 devices to connect to the
Internet at the same time. Which of the following is the BEST option for connectivity?
Which of the following will prevent unauthorized devices from connecting to a network switch?
A network technician has recently discovered rogue devices on their network and wishes to
implement a security feature that will prevent this from occurring. Which of the following will
prevent unauthorized devices from connecting to a network switch?
Which of the following contains the SYN and ACK flags?
Which of the following contains the SYN and ACK flags?