1.
An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN. Which of the following describes this methodology?
2.
A technician uses a cable tester to verify the pinout in an Ethernet cable. After testing each pin, the technician records the following output: Based on this information, which of the following identification describes this cable?
3.
An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address. Which of the following is the employee MOST likely using?
4.
A system administrator wants to verify external IP addresses are unable to collect software versioning from servers on the network. Which of the following should system administrator do to confirm the network is protected?
5.
 A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. Which of the following is MOST likely the cause of this issue?
6.
A client has combined the voice-data circuit from a provider and is getting the maximum download and upload speeds of 2.0Mbps. Which of the following services is being used?
7.
Joe, a network administrator, has installed an SFTP server behind a load-balancing router. He opened port 21 but was unable to establish a connection. Which of the following ports should he have opened?
8.
A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. Which of the following rules should the technician verify FIRST?
9.
Which of the following network infrastructure implementations would be used to connect two remote sales back to the main campus for all data and voice traffic?
10.
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of: