Informatik
Comptia N+
Comptia N+
Set of flashcards Details
Flashcards | 87 |
---|---|
Students | 17 |
Language | English |
Category | Computer Science |
Level | Primary School |
Created / Updated | 30.11.2014 / 18.01.2021 |
Weblink |
https://card2brain.ch/box/informatik26
|
Embed |
<iframe src="https://card2brain.ch/box/informatik26/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
799
A malicious user connects to an open wireless network and is able to copy, reassemble and play
back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user
performed?
796
Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that
was added to a main warehouse facility that already has complete wireless coverage on both the
2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main
warehouse. Which of the following is the first step that Joe should do before choosing which
WAP’s to use?
788
Which of the following OSI model layers are present in the application layer of the TCP/IP model?
(Select TWO).
789
Which of the following is a value that can be received from a DHCP server?
A. Bootp server address
B. SMTP server address
C. WWW server address
D. VPN server address
787
A workstation on the third floor of the company building is having connectivity issues. The NIC and
patch cable have been tested and found to be working properly. Which of the following would
MOST likely have the information the administrator would need to locate and test the remaining
cabling and connections?
A. Network maps
B. Network baseline
C. Asset management
D. Change management
783
A user is on a network with two upstream connections to the Internet and is experiencing
intermittent issues while connecting to websites. Some websites are available but others are not.
Which of the following is the MOST likely cause of the condition?
A. Incorrect VLAN assignment
B. Bad or missing routes
C. Switching loop
D. Wrong subnet mask
782
A company has a remote access VPN and wants to ensure that if a username and password are
compromised, the corporate network will remain secure. Which of the following will allow the
company to achieve its security goal?
A. Posture assessment
B. Kerberos
C. TACACS+
D. Two-factor authentication