Informatik

Comptia N+

Comptia N+

Celiktemel Okan

Celiktemel Okan

Kartei Details

Karten 87
Lernende 17
Sprache English
Kategorie Informatik
Stufe Grundschule
Erstellt / Aktualisiert 30.11.2014 / 18.01.2021
Weblink
https://card2brain.ch/box/informatik26
Einbinden
<iframe src="https://card2brain.ch/box/informatik26/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

799
A malicious user connects to an open wireless network and is able to copy, reassemble and play
back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user
performed?
 

796
Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that
was added to a main warehouse facility that already has complete wireless coverage on both the
2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main
warehouse. Which of the following is the first step that Joe should do before choosing which
WAP’s to use?
 

788
Which of the following OSI model layers are present in the application layer of the TCP/IP model?
(Select TWO).

 

789
Which of the following is a value that can be received from a DHCP server?

A. Bootp server address
B. SMTP server address
C. WWW server address
D. VPN server address

787
A workstation on the third floor of the company building is having connectivity issues. The NIC and
patch cable have been tested and found to be working properly. Which of the following would
MOST likely have the information the administrator would need to locate and test the remaining
cabling and connections?

A. Network maps
B. Network baseline
C. Asset management
D. Change management

783
A user is on a network with two upstream connections to the Internet and is experiencing
intermittent issues while connecting to websites. Some websites are available but others are not.
Which of the following is the MOST likely cause of the condition?

A. Incorrect VLAN assignment
B. Bad or missing routes
C. Switching loop
D. Wrong subnet mask

782
A company has a remote access VPN and wants to ensure that if a username and password are
compromised, the corporate network will remain secure. Which of the following will allow the
company to achieve its security goal?

A. Posture assessment
B. Kerberos
C. TACACS+
D. Two-factor authentication