1.
A technician has deployed multiple temperature monitoring devices with IP addresses in the 10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which of the following destination IP addresses must the technician configure on the server to send keep-alive packets to all the devices?
2.
Which of the following protocols can be found at the transport layer?
3.
Which of the following authentication protocols is typically employed in Cisco networks?
4.
Which of the following encryption types is an administrator MOST likely to enable on a public WAP in order to provide better security?
5.
A user reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?
6.
While troubleshooting DHCP configurations, a technician notices that the address pool is full of active leases although the workstations may not even be on the network. Which of the following would be the BEST solution?
7.
Which of the following is an example of two-factor authentication?
8.
Which of the following uses eight groups of characters for addressing?
9.
Which of the following WAN technologies uses labels to make forwarding decisions?
10.
An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users connection issues?