Which of the following devices is used to distribute network traffic equally over multiple links?

Which of the following devices is used to distribute network traffic equally over multiple links?A . Content filterB . DNS serverC . Load balancerD . Proxy serverView AnswerAnswer: C

November 6, 2018 No Comments READ MORE +

Which of the following would be the MOST efficient subnet mask for a point-to-point link?

Which of the following would be the MOST efficient subnet mask for a point-to-point link?A . /28B . /29C . /31D . /32View AnswerAnswer: C

November 4, 2018 No Comments READ MORE +

Which of the following would MOST likely be used when investigating the problem at Lisa's workstation?

Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation?A . nslookupB . routeC . nbtstatD . arpView AnswerAnswer: A

November 3, 2018 No Comments READ MORE +

Which of the following technologies allows more than two transceivers with an access point?

Which of the following technologies allows more than two transceivers with an access point?A . MIMOB . FIFOC . 802.1xD . WPAView AnswerAnswer: A

November 3, 2018 No Comments READ MORE +

Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?

Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?A . AUPB . SLAC . NDAD . MOUView AnswerAnswer: A

November 2, 2018 No Comments READ MORE +

Which of the following could be used to limit the access to the wireless network?

Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be...

October 30, 2018 No Comments READ MORE +

Which of the following needs to be configured on a switch to use a packet sniffer?

Which of the following needs to be configured on a switch to use a packet sniffer?A . Port trunkingB . Port mirroringC . Tagged VLAND . Untagged VLANView AnswerAnswer: B

October 30, 2018 No Comments READ MORE +

Which of the following WAP security features offers the STRONGEST encryption?

Which of the following WAP security features offers the STRONGEST encryption?A . WPAB . WPA2C . WEPD . Hidden SSIDView AnswerAnswer: B

October 29, 2018 No Comments READ MORE +

Which of the following is the MOST likely problem?

A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: 172.16.204.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1 Broadcast address: 172.16.255.255A...

October 29, 2018 No Comments READ MORE +

Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following?

Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following?A . Project managementB . Quality of serviceC . Configuration managementD . Bandwidth shapingView AnswerAnswer: C

October 28, 2018 No Comments READ MORE +