A) Shared secret
B) HTTPS server
C) Soft token
D) Private certificate
Correct Answer
verified
Multiple Choice
A) Switch
B) Router
C) IDS
D) Hub
E) IPS
F) Network tap
Correct Answer
verified
Multiple Choice
A) Replace the omnidirectional antennas with unidirectional antennas.
B) Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.
C) Replace the 802.11 wireless standard and use GSM instead.
D) Replace the wireless bridges with wireless routers.
Correct Answer
verified
Multiple Choice
A) EAP-PEAP
B) CCMP-AES
C) WPA2-PSK
D) TKIP-RC4
Correct Answer
verified
Multiple Choice
A) SIP
B) TFTP
C) SSL
D) ICMP
Correct Answer
verified
Multiple Choice
A) Port enumeration
B) Baseline review
C) Vulnerability scanning
D) Packet analysis
Correct Answer
verified
Multiple Choice
A) Two days
B) Three days
C) Six days
D) Seven days
Correct Answer
verified
Multiple Choice
A) IGRP
B) BGP
C) PPP
D) FTP
Correct Answer
verified
Multiple Choice
A) Change management records
B) Inventory management
C) Network log files
D) Logical diagrams
Correct Answer
verified
Multiple Choice
A) It creates various paths to a particular destination.
B) It increases the overall throughput of the links connecting the devices.
C) It provides redundancy if the sensor network experiences broad wireless interference.
D) It allows autonomous communication if the sensor network goes down.
Correct Answer
verified
Multiple Choice
A) Switch
B) Bridge
C) Hub
D) Transceiver
Correct Answer
verified
Multiple Choice
A) All ports should be configured for full duplex.
B) There is a 10/100 switch on the network.
C) The connections are using Cat 5 cable.
D) The connections are using Cat 6 cable.
E) There is a transceiver mismatch at the fiber termination point.
F) Signal attenuation on the new fiber has reached the upper limits.
Correct Answer
verified
Multiple Choice
A) Load balancer
B) IDS
C) Proxy server
D) Wireless controller
Correct Answer
verified
Multiple Choice
A) Remote desktop gateway
B) Transport mode IPSec
C) SSH tunneling
D) TLS VPN
Correct Answer
verified
Multiple Choice
A) STP
B) VLANs
C) SIP
D) DSCP
Correct Answer
verified
Multiple Choice
A) Conducting daily vulnerability scans
B) Performing daily port scans
C) Utilizing a protocol analyzer
D) Using a SIEM
E) Reviewing daily logs
Correct Answer
verified
Multiple Choice
A) LAN
B) WAN
C) SAN
D) PAN
Correct Answer
verified
Multiple Choice
A) SAN
B) MAN
C) CAN
D) PAN
E) LAN
Correct Answer
verified
Multiple Choice
A) Use port mirroring
B) Install an inline tap
C) Periodically view the server logs
D) Configure port aggregation
Correct Answer
verified
Multiple Choice
A) Run a port scanner on each name server to ensure TCP port 53 is open and listening.
B) Run tracert from a desktop client to query each name server and see what answers are sent back from each server. Run tracert from a desktop client to query each name server and see what answers are sent back from each server.
C) Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.
D) Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.
Correct Answer
verified
Showing 681 - 700 of 829
Related Exams