which of the following?
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the
following?
Which of the following ports is used to provide secure …
Which of the following ports is used to provide secure sessions over the web by default?
Which of the following should the technician check FIRST?
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on
the network. Which of the following should the technician check FIRST?
Which of the following is the MOST common connector tha…
A network technician has been asked to make the connections necessary to add video transported via fiber
optics to the LAN within a building. Which of the following is the MOST common connector that will be used on
the switch to connect the media converter?
Which of the following ACL should the technician configure?
A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the
192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select TWO)
Which of the following is the best option?
A technician is concerned about security and is asked to set up a network management protocol. Which of the
following is the best option?
which of the following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?
which of the following technologies to prevent unauthor…
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from
traversing the firewall?
Which of the following is the malicious student impleme…
A malicious student is blocking mobile devices from connecting to the internet when other students are in the
classroom. Which of the following is the malicious student implementing?
which of the following network segmentation techniques?
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer
3 capable in order to more adequately route packages. This is an example of which of the following network
segmentation techniques?