Which of the following mitigation techniques would be BEST used against cross-site scripting?
Which of the following mitigation techniques would be BEST used against cross-site
scripting?
In an enterprise setting, access switches providing network connectivity placed throughout a building are typi
In an enterprise setting, access switches providing network connectivity placed throughout a
building are typically connected to a backbone called the:
Which of the following destination IP addresses must the technician configure on the server to send keep-alive
A technician has deployed multiple temperature monitoring devices with IP addresses in the
10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the
server every five minutes. Which of the following destination IP addresses must the
technician configure on the server to send keep-alive packets to all the devices?
Which of the following wireless standards has the highest maximum data rate?
Which of the following wireless standards has the highest maximum data rate?
Which of the following solutions will detect and disable a rogue access point?
Which of the following solutions will detect and disable a rogue access point?
which of the following ports?
A zone transfer occurs over which of the following ports?
Which of the following authentication protocols is typically employed in Cisco networks?
Which of the following authentication protocols is typically employed in Cisco networks?
Which of the following results is to be expected?
A technician claims to have crimped a patch cable according to the T568A standard on one
end and T568B on the other. Which of the following results is to be expected?
Which of the following encryption types is an administrator MOST likely to enable on a public WAP in order to
Which of the following encryption types is an administrator MOST likely to enable on a public
WAP in order to provide better security?
Which of the following addressing schemes was designed for this scenario?
An administrator is setting up a security camera that will send the same feed to twelve of the
twenty workstations on the network. Which of the following addressing schemes was
designed for this scenario?