Which of the following will allow the technician to per…
A network technician is performing a tracert command to troubleshoot a website-related issue. The following
output is received for each hop in the tracert:
1 * * * Request timed out.
2 * * * Request timed out.3 * * * Request timed out.
The technician would like to see the results of the tracert command. Which of the following will allow the
technician to perform tracert on external sites but not allow outsiders to discover information from inside the
network?
which of the following has the technician learned about…
A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo”
command to list information about the existing condition.
myClient$ wificard –getinfoagrCtlRSSI:-72
agrExtRSSI:0
state:running
op mode: station
lastTxRate:178
MaxRate:300
802.11 auth:open
link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless
Channel:149,1
Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
Which of the following steps of incident handling has b…
A network technician was tasked to respond to a compromised workstation. The technician documented the
scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of
incident handling has been incorrectly performed?
Which of the following forensics actions should Ann perform?
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the
directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files
and believes it contains illegal material. Which of the following forensics actions should Ann perform?
Which of the following is a security benefit gained fro…
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following types of network would be set up…
Which of the following types of network would be set up in an office so that customers could access the Internet
but not be given access to internal resources such as printers and servers?
which of the following NAC features?
The ability to make access decisions based on an examination of Windows registry settings, antivirus software,
and AD membership status is an example of which of the following NAC features?
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which ports need
to be opened to allow remote access to the system. Which of the following should the technician perform?
which of the following manners would meet the company’s…
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The
company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to
web browsing only. Reordering the ACL in which of the following manners would meet the company’s
objectives?
Which of the following would the technician MOST likely…
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
other using peer to peer communication. Which of the following would the technician MOST likely configure?