A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?
Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?
Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?
A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?
Which of the following should be mitigated by employing proper coding techniques when developing software?
In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented?
A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?