Category: Network Support and Security
Network Support and Security: My Knowledge Check Answers 1. Employees in an organization report that they cannot access the customer database on the main server. Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization receives a threatening email demanding payment for the decryption …
Network Support and Security Final Exam Answers 1. Refer to the exhibit. A technician is attempting to map the local network using CDP. According to the output shown, which two statements are true about router Branch01? (Choose two.) Router Branch01 is directly connected to port Gi0/1/0 on device …
1. What is the level of need for data integrity in an e-commerce organization? low mid high critical 2. Which three solutions are examples of logical access control? (Choose three.) firewall access control list biometrics fence laptop lock swipe card 3. Which host-based solution is installed on a …
1. What does a rootkit modify? operating system programs screen savers Notepad Microsoft Word 2. An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this? bluesnarfing smishing RF jamming bluejacking 3. …
1. After a problem is defined, what is the next step in the seven-step troubleshooting process? gather information analyze information propose hypothesis eliminate possible causes 2. Which two types of problems are best investigated with a bottom-up troubleshooting method? (Choose two.) problems involving an issue not seen before …