1. What does a rootkit modify? operating system programs screen savers Notepad Microsoft Word 2. An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this? bluesnarfing smishing RF jamming bluejacking 3. …
1. After a problem is defined, what is the next step in the seven-step troubleshooting process? gather information analyze information propose hypothesis eliminate possible causes 2. Which two types of problems are best investigated with a bottom-up troubleshooting method? (Choose two.) problems involving an issue not seen before …
Network Technician Career Path Exam Answers 1. What two radio frequency bands are used in home Wireless LANs? (Choose two.) 5 MHz 9 MHz 2.4 GHz 5 GHz 900 GHz 2. Which is a characteristic of the network SSID? It is encrypted by default. It is case sensitive. …
1. Match the task and purpose to the appropriate Big Data analytics method. 2. Match the type of data analysis with the question it can answer. 3. Which statement is true concerning data analytics? Descriptive analytics uses a feedback system to track the outcome of actions taken. Prescriptive …
Module 1.4.2 Quiz – Data Analytic Projects Answers 1. A college has deployed next-generation analytics. Which question would most likely be answered by next generation analytics that could not be answered by traditional analysis tools? Which class has the most sections available? What are the 10 most expensive …
Cybersecurity Pathway Final Exam Answers – Junior Cybersecurity Analyst Career Path Exam 1. What is a characteristic of the security onion analogy to visualizing defense-in-depth? The core or heart of the onion represents the firewall surround by protective layers. The outer skin of the onion represents hardened internet-facing …
4.0 Introduction 4.0.1 Why Should I Take this Module? Welcome to Build a Simple Peer-to-Peer Network! A simple peer-to-peer network usually involves directly hard wiring two computers together so that they can share files. Hard wiring requires the correct cables. This module explains the three different types of …
1. In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members? client server pruning transparent 2. What are two characteristics of an extended ACL? (Choose two.) IP is used to specify TCP traffic only. IP …
1. Refer to the exhibit. Based on the output shown, to which IP network should the workstations in the Support department belong? 192.168.1.0 172.16.1.0 172.16.3.0 172.16.5.0 2. Refer to the exhibit. A network administrator is doing proactive network maintenance. The administrator pings 192.168.1.100 and compares the results to …
1. Refer to the exhibit. A network administrator needs to add the command deny ip 10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access-list command. What sequence number does the new entry have? 0 10, and all other …