Question 56
Which of the following connector types would have the MOST flexibility?
Question 57
A network technician is planning a network scope. The web server needs to be within 12.31 69.1 to 12.31.69.29. Which of the following would meet this requirement?
Question 58
A technician is assisting a user who cannot access network resources when the workstation is connected to a VoIP phone. The technician identifies the phone as faulty and replaces it. According to troubleshooting methodology, which of the following should the technician do NEXT?
Question 59
During a risk assessment which of the following should be considered when planning to mitigate high CPU utilization of a firewall?
Question 60
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?