Which of the following threats did the network technician find?
A network technician is doing a wireless audit and finds an SSID that does not match the company’s
SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of
the following threats did the network technician find?
They are evaluating the feasibility of implementing WP
A technician needs to install a new wireless encryption system. They are evaluating the feasibility of
implementing WP
Which of the following would be used?
A network administrator wants to perform a test to see if any systems are passing clear text through
the network. Which of the following would be used?
Which of the following would allow the network administrator to collect log files on a centralized host?
A network administrator currently collects log files from several different servers. Which of the
following would allow the network administrator to collect log files on a centralized host?
Which of the following should the technician do NEXT?
A number of remote users have reported being unable to securely log on to the company’s network.
Upon speaking with some of the employees experiencing the issue, no changes were made to their
configurations, usernames, or passwords. The technician establishes a theory that one of the VPN
concentrators may be down. Which of the following should the technician do NEXT?
Which of the following network topologies is ONLY possible between two users?
Which of the following network topologies is ONLY possible between two users?
which action should the technician take to correct Ann’s problem?
Ann, a new user, is unable to communicate on the network from her computer. A technician has
verified that the cables are functioning properly. Based on the information below, which action
should the technician take to correct Ann’s problem?
Computer_A Switch_A
IP: 10.0.0.60 Int VLAN10
SM: 255.255.255.0 IP address 10.0.0.1/28
GW: 10.0.0.1 Speed 100 Duplex Full
Which of the following tools should the technician use to complete this objective QUICKEST?
A new technician has been tasked with implementing a QoS policy for the Network. The technician
decides it would be best to monitor the information traversing the network to gain statistical
information on ports and protocols utilized. Which of the following tools should the technician use
to complete this objective QUICKEST?
Which of the following wireless standards is the WLAN card MOST likely using?
A technician is installing an 802.11n network. The technician is using a laptop that can connect at a
maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but
thinks it could be the type of WLAN card used on the laptop. Which of the following wireless
standards is the WLAN card MOST likely using?
Which of the following firewall rules will block destination telnet traffic to any host with the source IP add
Which of the following firewall rules will block destination telnet traffic to any host with the source
IP address 1.1.1.2/24?