EnsurepassQUESTION 261 Which of the following is the MOST secure way to prevent malicious changes to a firewall?   A.      SNMPv2 access only B.      TELNET access only C.      SSH access only D.      Console access only Correct Answer: D     QUESTION 262 Which of the following allows a malicious attacker to view network traffic if the attacker is on the same Read more [...]
EnsurepassQUESTION 241 Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?   A.      Layer 3 B.      Layer 5 C.      Layer 6 D.      Layer 7   Correct Answer: C     QUESTION 242 A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the Read more [...]
EnsurepassQUESTION 231 Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?   A. IP filtering B. Port filtering C. MAC address filtering D. DHCP lease   Correct Answer: A     QUESTION 232 Which of the following remote access types requires a certificate for connectivity?   A.      SSH B.      PPP C.      HTTPS D.      Read more [...]
EnsurepassQUESTION 221 When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?   A.      802.1q B.      Collision avoidance C.      Port mirroring D.      STP   Correct Answer: A     QUESTION 222 A technician has been dispatched to investigate an issue where several users in the same aisle have stated Read more [...]
EnsurepassQUESTION 211 Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?   A.      Access control list B.      Load balancer C.      Content filter D.      Proxy server   Correct Answer: B   QUESTION 212 Which of the following devices can be utilized to monitor and block websites Read more [...]
EnsurepassQUESTION 201 A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?   A.      Document findings B.      Identify the problem C.      Escalate the problem D.      Read more [...]
EnsurepassQUESTION 191 A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions?   A.      A VPN concentrator B.      A switch C.      A router D.      A firewall Read more [...]
EnsurepassQUESTION 171 Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors? Building A Building B Read more [...]