Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actor's actions was logged. The administrator notes that the server receiving and storing the events was not compromised by any attack and is properly communicating with all network devices.
Which of the following can the administrator employ to improve network access accountability?
A. Activate the audit logs on the network server and resources.
B. Configure SNMP on the network server.
C. Deploy a central SIEM server into the network.
D. Collect traffic statistics from the servers using NetFlow data.
A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?
A. RST
B. FIN
C. ICMP Time Exceeded
D. Redirect
Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?
A. The switch was configured with port security.
B. Newly added machines are running into DHCP conflicts.
C. The IPS was not configured to recognize the new users.
D. Recently added users were assigned to the wrong VLAN
An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure?
A. Fiber
B. Leased line
C. Satellite
D. Metro optical
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
A. a divide-and-conquer approach
B. a bottom-up approach.
C. a top-to-bottom approach
D. Implementing a solution
Which of the following protocol types describes secure communication on port 443?
A. ICMP
B. UDP
C. TCP
D. IP
Which of the following would be BEST suited for use at the access layer in a three-tier architecture system?
A. Router
B. Multilayer switch
C. Layer 2 switch
D. Access point
An IT technician is working on a support ticket regarding an unreachable website. The technician has utilized the ping command to the website, but the site is still unreachable. Which of the following tools should the technician use NEXT?
A. ipconfig
B. tracert
C. arp
D. netstat
A company has multiple offices around the world. The computer rooms in some office locations are too warm Dedicated sensors are in each room, but the process of checking each sensor takes a long time. Which of the following options can the company put In place to automate temperature readings with internal resources?
A. Implement NetFlow.
B. Hire a programmer to write a script to perform the checks
C. Utilize ping to measure the response.
D. Use SNMP with an existing collector server
An IT administrator received an assignment with the following objectives
1.
Conduct a total scan within the company's network tor all connected hosts
2.
Detect all the types of operating systems running on all devices
3.
Discover all services offered by hosts on the network
4.
Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
A. nmap
B. arp
C. netatat
D. tcpdump
An online gaming company needs a cloud solution that will allow for more virtual resources to be deployed when tournaments are held. The number of users who access the service increases during tournaments. The company also needs the resources to return to baseline levels once the resources are not needed in order to reduce cost. Which of the following cloud concepts would provide the best solution?
A. Scalability
B. Hybrid
C. Multitenancy
D. Elasticity
Which of the following layers of the OSI model is responsible for end-to-end encryption?
A. Presentation
B. Application
C. Session
D. Transport
Which of the following passwords would provide the best defense against a brute-force attack?
A. ThisIsMyPasswordForWork
B. Qwerty!@#$
C. Password!1
D. T5!8j5
A network technician for a bank configured a WLAN that provides good coverage. Bank employees are now reporting Wi-Fi issues when the microwave in the lunch room area is used. Which of the following frequencies should the technician use to minimize interference?
A. 2.4GHz
B. 5MHz
C. 5GHz
D. 700MHz