Question no 75 a malicious user floods a switch with

  • No School
  • AA 1
  • Jiraiya500
  • 18

This preview shows page 13 - 15 out of 18 pages.

QUESTION NO: 75A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which ofthe following attacks is the user MOST likely using?A.DNS poisoningB.ARP poisoningC.ReflectionD.SYN attack
QUESTION NO: 76Which of the following is a security benefit gained from setting up a guest wireless network?
QUESTION NO: 77A company has seen an increase in ransomware across the enterprise. Which of the following shouldbe implemented to reduce the occurrences?
QUESTION NO: 78Before logging into the company network, users are required to sign a document that is to be storedin their personnel file. This standards and policies document is usually called which of the following?
QUESTION NO: 79A network technician has set up an FTP server for the company to distribute software updates fortheir products. Each vendor is provided with a unique username and password for security. Severalvendors have discovered a virus in one of the security updates. The company tested all files beforeuploading them but retested the file and found the virus. Which of the following could the techniciando for vendors to validate the proper security patch?A.Use TFTP for tested and secure downloadsB.Require biometric authentication for patch updatesC.Provide an MD5 hash for each file
D.Implement a RADIUS authenticationQUESTION NO: 80A technician wants to securely manage several remote network devices. Which of the followingshould be implemented to securely manage the devices?
QUESTION NO: 81A PC technician has installed a new network printer that was preconfigured with the correct static IPaddress, subnet mask, and default gateway. The printer was installed with a new cable and appearsto have link activity, but the printer will not respond to any network communication attempts. Which ofthe following is MOST likely the cause of the problem?
QUESTION NO: 82A network technician has detected duplicate IP addresses on the network. After testing the behaviorof rogue DHCP servers, the technician believes that the issue is related to an unauthorized homerouter. Which of the following should the technician do NEXT in the troubleshooting methodology?

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 18 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Computer network, Network switch, network technician

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture