1. Hackers have gained access to account information and can now login into a system with the same rights as authorized users. What type of attack is this? compromised key password-based DoS social engineering 2. In what type of attack can threat actors change the data in packets …
1. What allows a switch to make duplicate copies of traffic passing through it, and then send it out a port with a network monitor attached? AAA Server ACL Port Mirroring VPN 2. What is a series of commands that control whether a device forwards or drops packets …
1. Which type of firewall filters information at Layers 3, 4, 5, and 7 of the OSI reference model? Host-based Hybrid Application gateway Packet filtering Stateful 2. Which type of firewall is a combination of various firewall types? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent 3. …
1. Which network design layer provides endpoints and users with a connection to the network? Access layer Core layer Distribution layer Hierarchical layer 2. Which network design layer provides connectivity between distribution layers for large LAN environments? Access layer Core layer Distribution layer Hierarchical layer 3. Which network …
1. Which device must connect to another device to gain access to the network? end devices wireless access point switch router 2. Which device connects wireless clients to the network? switch router wireless access point (WAP) end device 3. Which device uses MAC addresses to determine the exit …
1. What are two events that can occur in Step 1 (Discovery) of the client and AP association process? (Choose two.) agree with AP to share Open authentication send client’s MAC address to AP listen for beacon frames to find WLAN SSIDs (passive mode) send a probe request …
1. What information does DHCPv4 provide to network clients? (Choose three.) host address MAC address DHCP version number subnet mask default gateway address 2. True or false. DHCP can lease addresses to hosts for different periods of time. True False 3. In large networks, static IPv4 addresses are …
1. What field is used by the destination host to reassemble segments into the original order? Control Bits Destination Port Sequence Number Source Port Window Size 2. What field is used to provide flow control? Control Bits Destination Port Sequence Number Source Port Window Size 3. What happens …
1. Which statement about host forwarding decisions is true? A host cannot ping itself. A remote destination host is on the same local network as the sending host. Local hosts can reach each other without the need of a router. Routing is enabled on switches to discover the …
1. Which two statements are correct about an IPv4 address? (Choose two.) It contains a network portion. It contains a host portion. It is 24 bits in length. The information within the IPv4 address is sufficient for determining the network portion and host portion of the address. 2. …