EnsurepassQUESTION 621 Which of the following protocols is Karen, a user, utilizing if no handshake or data reliability are required?   A.      TCP B.      FTP C.      TFTP D.      UDP   Correct Answer: D     QUESTION 622 Sandy, an administrator, believes that the network has been attacked and there is no known definition or prevention method to help avoid this attack. Which of Read more [...]
EnsurepassQUESTION 611 Which of the following technologies facilitates the conversion of internal private IP addressing to external public IP addressing?   A.      DHCP B.      TCP/IP C.      NAT D.      SNMP   Correct Answer: C     QUESTION 612 Which of the following logical network topologies is used to provide a secure connection across the Internet?   A.      Read more [...]
EnsurepassQUESTION 611 Which of the following technologies facilitates the conversion of internal private IP addressing to external public IP addressing?   A.      DHCP B.      TCP/IP C.      NAT D.      SNMP   Correct Answer: C     QUESTION 612 Which of the following logical network topologies is used to provide a secure connection across the Internet?   A.      Read more [...]
EnsurepassQUESTION 601 Which of the following devices should an administrator connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?   A.      Hub B.      VLAN C.      Router D.      Server   Correct Answer: A     QUESTION 602 The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator Read more [...]
EnsurepassQUESTION 591 After a brownout, a user can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue?   A.      Switching loop B.      Power failure C.      Broadcast storm D.      Duplicate IP address   Correct Answer: B     QUESTION 592 An administrator is experiencing availability Read more [...]
EnsurepassQUESTION 571 Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?   A.      Honeynet B.      Honeypot C.      Vulnerability scanner D.      Network based IDS   Correct Answer: A     QUESTION 572 A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an Read more [...]
EnsurepassQUESTION 541 An administrator needs to update a router configuration for a router that does not support SSH. Which of the following can be used to securely update the router configuration?   A.      FTP B.      SNMPv2 C.      TFTP D.      HTTPS   Correct Answer: D     QUESTION 542 Which of the following is an invalid IPv4 address?   A.      Read more [...]
EnsurepassQUESTION 531 An administrator wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 Internet access network. Which of the following optimizations should the administrator implement?   A.      Load balancing B.      Caching engine C.      Traffic shaping D.      Quality of service   Correct Answer: C     Read more [...]
EnsurepassQUESTION 511 Administrators are performing a war drive around their company's complex. Which of the following are they attempting to detect?   A.      Worms B.      Rogue access points C.      DDoS attacks D.      Bluesnarfing attacks   Correct Answer: B     QUESTION 512 Which of the following is an interior routing protocol that is used to provide routing within autonomous Read more [...]
EnsurepassQUESTION 501 When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?   A.      PCs will attempt to use the last address assigned to them. B.      PCs will pull from a static address pool. C.      PCs will use APIPA. D.      PCs will prompt the user for an address.   Correct Answer: C     QUESTION 502 Which of the following protocols Read more [...]