Question 81
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
Question 82
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
Question 83
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
A. Scope options
B. Reservation
C. Dynamic assignment
D. Exclusion
E. Static assignment
Question 84
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
Question 85
A workstation is configured with the following network details:
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A. 10.1.2.0
B. 10.1.2.1
C. 10.1.2.23
D. 10.1.2.255
E. 10.1.2.31
Question 86
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?
A. TTL
B. MX
C. TXT
D. SOA
Question 87
A network administrator is installing a wireless network at a client's office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?
A. CDMA
B. CSMA/CD
C. CSMA/CA
D. GSM
Question 88
A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?
A. Asset tags
B. A smart locker
C. An access control vestibule
D. A camera
Question 89
Which of the following attacks encrypts user data and requires a proper backup implementation to recover?
A. DDoS
B. Phishing
C. Ransomware
D. MAC spoofing
Question 90
A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?
A. A honeypot
B. Network segmentation
C. Antivirus
D. A screened subnet