Which of the following protocols would the network administrator use to protect login credentials when accessi
Which of the following protocols would the network administrator use to protect login credentials
when accessing a router terminal session?
Which of the following threats did the network technician find?
A network technician is doing a wireless audit and finds an SSID that does not match the
company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is
Default. Which of the following threats did the network technician find?
Which of the following should the administrator do NEXT?
A network administrator notices that load balancing is not working properly on the web cluster as
previously configured. In speaking with management, a change to the IP addressing scheme was
made yesterday which possibly affected one member of the cluster. Due to the timing of the
events, the administrator theorizes that this change caused the problem. Which of the following
should the administrator do NEXT?
Which of the following are standard fiber cable connector types?
Which of the following are standard fiber cable connector types? (Select TWO).
Which of the following should MOST likely be provided to the user to accomplish this?
A user would like to connect two laptops together and transfer files via the Ethernet ports. Which
of the following should MOST likely be provided to the user to accomplish this?
Hubs are differentiated from switches in that between the two, only hubs have:
Hubs are differentiated from switches in that between the two, only hubs have:
Which of the following should this line be connected to?
The phone company has provided a channelized T1 line. Which of the following should this line be
connected to?
Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?
Which of the following spreads out each of the individual wires of a UTP cable onto their own
metal connector?
Which of the following BEST describes this AP?
A user at a hotel sees two SSIDs; both are called “HotelWireless”. After the PC connects to one of
the APs, the user notices their browser homepage has been changed. Which of the following
BEST describes this AP?
Which of the following tools would MOST likely accomplish this?
An administrator would like to search for network vulnerabilities on servers, routers, and
embedded appliances. Which of the following tools would MOST likely accomplish this?