An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?
Which of the following ports is used to provide secure sessions over the web by default?
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the
technician check FIRST?
A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the
following is the MOST common connector that will be used on the switch to connect the media converter?
A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACL should the
technician configure? (Select TWO)
A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route
packages. This is an example of which of the following network segmentation techniques?