A network technician needs to ensure outside users are unable to telnet into any of the
servers at the datacenter. Which of the following ports should be blocked when checking
firewall configuration?
A.
22
B.
23
C.
80
D.
3389
E.
8080
23
A store owner would like to have secure wireless access available for both business equipment andpatron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A.
MIMO
B.
TKIP
C.
LTE
D.
SSID
SSID
Which of the following systems would MOST likely be found in ascreened subnet?
A.
RADIUS
B.
FTP
C.
SQL
D.
LDAP
FTP
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?
A.
The link is improperly terminated
B.
One of the devices is misconfigured
C.
The cable length is excessive
D.
One of the devices has a hardware issue
The cable length is excessive
Which of the following is used to track and document various types of known
vulnerabilities?
A.
A. CVE
B.
Penetration testing
C.
Zero-day
D.
SIEM
E.
Least privilege
A. CVE
Page 11 out of 41 Pages |
Previous |