Which of the following is an invalid MAC address?

Which of the following is an invalid MAC address?A . AA:CE:58:FD:90:08B . 44:98:3E:F8:33:23C . 56:AD:BX:89:55:54D . 94:9E:FE:EE:8C:DFView AnswerAnswer: C

August 13, 2018 No Comments READ MORE +

Which of the following tools would be used?

An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?A . Protocol analyzerB . Butt setC . OTDRD . Toner probeView AnswerAnswer: B

August 12, 2018 No Comments READ MORE +

Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?

Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?A . biometric scannersB . door locksC . video surveillanceD . motion detectorsView AnswerAnswer: B

August 12, 2018 No Comments READ MORE +

Which of the following ACL rules should be configured in the firewall’s WAN port?

A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web...

August 11, 2018 No Comments READ MORE +

Which of the following solutions should the technician install to meet these requirements?

A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements?A . DOCSIS...

August 11, 2018 No Comments READ MORE +

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?A . 20B . 53C . 80D . 3389View AnswerAnswer: B

August 10, 2018 No Comments READ MORE +

Which of the following will increase the authentication factor to three?

A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?A . Adding a fingerprint reader to each workstation and providing...

August 10, 2018 No Comments READ MORE +

Which of the following should the technician do NEXT?

A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should the technician do NEXT?A . Implement the solutionB . Question usersC . Test the theoryD . Escalate the problemView AnswerAnswer: C

August 10, 2018 No Comments READ MORE +

Which of the following would allow him to test basic functionality of the NIC?

Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?A . Loopback plugB . Protocol analyzerC . Smart jackD . CouplerView AnswerAnswer: A

August 10, 2018 No Comments READ MORE +

Users have been experiencing slow network response times, and management has asked the network technician to provide evidence of network improvement. After optimizing the network, which of the following would be required?

Users have been experiencing slow network response times, and management has asked the network technician to provide evidence of network improvement. After optimizing the network, which of the following would be required?A . IDF/MDF documentationB . Change managementC . Performance baselineD . Physical diagramView AnswerAnswer: C

August 9, 2018 No Comments READ MORE +