1. A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?
A) A. Single sign-on B) B. RADIUS C) C. TACACS+ D) D. Captive portal
2. A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?
A) A. Spam B) B. Ransomware C) C. Man-in-the-middle D) D. Phishing
3. A network engineer is trying to determine where to place a firewall based on the flow of traffic. Which of the following types of documentation would assist the engineer in doing this?
A) A. Change management B) B. Rack diagram C) C. Network configuration D) D. Network diagram
4. A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue?
A) A. Attenuation B) B. Incorrect pin-out C) C. Damaged cable D) D. Switch configuration
5. Which of the following is the MOST secure type of remote administration?
A) A. SSH over IPsec client-to-site VPN B) B. RDP over SSLv2 HTTPS terminal services gateway C) C. HTTP over WPA2-TKIP WiFi D) D. Telnet over PSTN
Leave a comment