1. A network administrator has funding to do a major upgrade of the companys LAN. This upgrade is currently in the planning stages and still needs to determine the network requirements, bottlenecks and any future upgrades in mind. Which of the following is the first step in the planning process?

A. Conduct a vulnerability scan
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment

2. A network administrator wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?

A. Behavioral Based IDS
B. Signature Based IDS
C. Behavioral Based IPS
D. Signature Based IPS

3. Which of the following should a technician do first when setting up a SOHO network?

A. Set up an account with an Internet service provider
B. Create a list of requirements and constraints
C. Arrange a domain name with a suitable registrar
D. Choose the correct operating system version

4. Which of the following is an example of two-factor authentication?

A. A username and PIN
B. A username and password
C. A username, password, finger print scan and smart card
D. A username, password and key fob number

5. Which of the following connector types would a network technician use to connect a serial cable?

A. RJ-11
B. BNC
C. LC
D. DB-9

Back to Home Page
Site Code:
FINDCT
English Close