Which of the following utilities will identify if the w…
An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the
workstation uses DHCP?
which of the following has the technician learned about…
A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo”
command to list information about the existing condition.
myClient$ wificard –getinfo
agrCtlRSSI:-72
agrExtRSSI:0
state:running
op mode: station
lastTxRate:178
MaxRate:300802.11 auth:open
link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless
Channel:149,1
Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
Which of the following should the technician do NEXT in…
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue
DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the
following should the technician do NEXT in the troubleshooting methodology?
Which of the following should be the FIRST question the…
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it.
However, his colleagues are able to print their documents to the same shared printer. Which of the following
should be the FIRST question the helpdesk asks?
Which of the following should the network technician do…
A network technician is using a network monitoring system and notices that every device on a particular
segment has lost connectivity. Which of the following should the network technician do NEXT?
Which of the following steps of incident handling has b…
A network technician was tasked to respond to a compromised workstation. The technician documented the
scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of
incident handling has been incorrectly performed?
Which of the following forensics actions should Ann perform?
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the
directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files
and believes it contains illegal material. Which of the following forensics actions should Ann perform?
Which of the following is a security benefit gained fro…
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following types of network would be set up…
Which of the following types of network would be set up in an office so that customers could access the Internet
but not be given access to internal resources such as printers and servers?
which of the following NAC features?
The ability to make access decisions based on an examination of Windows registry settings, antivirus software,
and AD membership status is an example of which of the following NAC features?