- (Exam Topic 1)
A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?
Correct Answer:C
- (Exam Topic 3)
Which of the following technologies allows for redundant links within a Layer 2 segment?
Correct Answer:D
- (Exam Topic 1)
A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?
Correct Answer:A
- (Exam Topic 1)
A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?
Correct Answer:D
- (Exam Topic 1)
A technician is downloading an ISO from a vendor’s website. To ensure the integrity of the download, which of the following should be verified?
Correct Answer:C
- (Exam Topic 1)
A network technician is able to connect the switches between to offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?
Correct Answer:C