Which of the following is MOST likely the problem?
Users in several departments are reporting connectivity problems. The technician examines the
computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of
255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can
connect to the internet but not servers on other internal subnets. The technician is not able to
connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem?
Which of the following attacks is spread by attaching themselves to files?
Which of the following attacks is spread by attaching themselves to files?
Which of the following will allow the company to achieve its security goal?
A company has a remote access VPN and wants to ensure that if a username and password are
compromised, the corporate network will remain secure. Which of the following will allow the
company to achieve its security goal?
Which of the following correctly lists the layers of the OSI model starting at Layer 1?
Which of the following correctly lists the layers of the OSI model starting at Layer 1?
Which of the following attacks has the user performed?
A malicious user connects to an open wireless network and is able to copy, reassemble and play
back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user
performed?
which of the following ACLs would accomplish this goal?
A technician is tasked with adding an ACL to the host-based firewall of a PC. The ACL should
allow the Development Server to only connect to the PC’s HTTP server on the default port. Given
the IP addresses below, which of the following ACLs would accomplish this goal?
Development Server: 192.168.1.100 PC. 192.168.3.3
which layer of the OSI and TCP/IP model would HTTP and FTP be found?
At which layer of the OSI and TCP/IP model would HTTP and FTP be found?
Which of the following should the administrator recommend to users to secure their wireless communications at
Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop
only has an open wireless network. Which of the following should the administrator recommend to
users to secure their wireless communications at the coffee shop?
which of the following types of attack?
Malicious users have used multiple workstations to target a single server with the intent of
preventing legitimate users from accessing the server. This server suffered which of the following
types of attack?
which layer of the TCP/IP model would cabling exist?
At which layer of the TCP/IP model would cabling exist?