Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This
upgrade is currently in the planning stage, and Sandy still needs to determine the network
requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST
step in the planning process?
A. Conduct a vulnerability scan
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment
Sandy, a network administrator, wants to be able to block all already known malicious activity.
Which of the following would allow her to perform this activity?
A. Behavioral Based IDS
B. Signature Based IDS
C. Behavioral Based IPS
D. Signature Based IPS
Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?
A. Set up an account with an Internet service provider.
B. Create a list of requirements and constraints.
C. Arrange a domain name with a suitable registrar.
D. Choose the correct operating system version.
Which of the following is an example of two-factor authentication?
A. A username and PIN
B. A username and password
C. A username, password, finger print scan, and smart card
D. A username, password, and key fob number
Which of the following connector types would Sandy, a network technician, use to connect a serial