Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model?
Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP
model? (Select TWO).
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
Which of the following will BEST block a host from accessing the LAN on a network using static IP
addresses?
Which of the following remote access types requires a certificate for connectivity?
Which of the following remote access types requires a certificate for connectivity?
which layer of the OSI model do MAC addresses operate?
At which layer of the OSI model do MAC addresses operate?
which of the following authentication methods was being used?
A technician is troubleshooting authentication issues on a server. It turns out the clock on the
server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the
scenario, which of the following authentication methods was being used?
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
Which of the following wireless standards uses a block encryption cipher rather than a stream
cipher?
Which of the following is the MOST likely reason that the users are unable to access any network segments?
A network technician recently replaced a managed switch in an enterprise network with a new
managed switch. Users on the switch can communicate with each other but now cannot access
other network segments. Which of the following is the MOST likely reason that the users are
unable to access any network segments?
Which of the following can be used to find the key?
A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does
Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?
Which of the following represents the MINIMUM CIDR notation of this subnet mask?
A company has been given a Class C address to be utilized for all devices. The company has
several subnets and the largest subnet has 15 hosts. Which of the following represents the
MINIMUM CIDR notation of this subnet mask?