which of the following threats?
Ann, a user, connects to her company’s secured wireless network in the conference room when
attending meetings. While using the conference room this morning, Ann notices an unsecured
wireless network with the same name is available. Ann connects her laptop to this network instead
of to the secured one. Ann has fallen victim to which of the following threats?
Which of the following features of the firewall is responsible for blocking RDP?
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules
and notes that there is no rule that blocks RDP. Which of the following features of the firewall is
responsible for blocking RDP?
Which of the following represents the BEST location for the new firewall?
A network technician is configuring a new firewall for placement into an existing network
infrastructure. The existing network is connected to the Internet by a broadband connection. Which
of the following represents the BEST location for the new firewall?
Which of the following is the FIRST step in preventing spam that is originating from bots on the network?
A network administrator is tasked with blocking unwanted spam which is being relayed by an
internal email server. Which of the following is the FIRST step in preventing spam that is originating
from bots on the network?
Which of the following would BEST allow the technician to comply with the request?
A technician is asked to filter inbound and outbound traffic of a specific service on the network.
Which of the following would BEST allow the technician to comply with the request?
Which of the following methods uses this process?
A user enters a password into a logon box on a PC. The server and the PC then compare one-way
hashes to validate the password. Which of the following methods uses this process?
Which of the following would MOST likely be used with minimal client configuration?
A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the
following would MOST likely be used with minimal client configuration?
Which of the following attacks has just occurred?
A user receives a phone call at home from someone claiming to be from their company’s IT help
desk. The help desk person wants to verify their username and password to ensure that the user’s
account has not been compromised. Which of the following attacks has just occurred?
Which of the following tools would MOST likely accomplish this?
An administrator would like to search for network vulnerabilities on servers, routers, and embedded
appliances. Which of the following tools would MOST likely accomplish this?
Which of the following tools would the administrator MOST likely use?
An administrator would like to scan for open ports on the subnet and determine if any vulnerable
applications are listening. Which of the following tools would the administrator MOST likely use?