Which of the following should he disable to stop broadcasting the network name?

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?A . ChannelB . WEPC . SSIDD . WPAView AnswerAnswer: C

June 10, 2018 No Comments READ MORE +

Which of the following is true about an IP address if the first bit is a one and the second bit is a zero?

Which of the following is true about an IP address if the first bit is a one and the second bit is a zero?A . The address is a Class A address.B . The address is a Class B address.C . The address is a Class C address.D . The...

June 8, 2018 No Comments READ MORE +

Which of the following protocols would be used to send email to an email server?

Which of the following protocols would be used to send email to an email server?A . NTPB . FTPC . SNMPD . SMTPView AnswerAnswer: D

June 7, 2018 No Comments READ MORE +

Which tool would BEST allow the administrator to inspect what type of traffic is on the network?

A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?A . Wire tapB . Network snifferC...

June 6, 2018 No Comments READ MORE +

Which of the following uses eight groups of characters for addressing?

Which of the following uses eight groups of characters for addressing?A . MACB . IPv4C . IPv6D . DHCPView AnswerAnswer: C

June 5, 2018 No Comments READ MORE +

Which of the following is a vulnerable system designed to detect and log unauthorized access?

Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B

June 5, 2018 No Comments READ MORE +

Which of the following physical security controls is MOST likely to be susceptible to a false positive?

Which of the following physical security controls is MOST likely to be susceptible to a false positive?A . Identification cardB . Biometric deviceC . Proximity readerD . Video cameraView AnswerAnswer: C

June 3, 2018 No Comments READ MORE +

Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).

Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).A . 21B . 22C . 23D . 53E . 67View AnswerAnswer: B,C

June 2, 2018 No Comments READ MORE +

Which of the following cloud models should the technician identify in the proposal?

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the...

May 31, 2018 No Comments READ MORE +

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?A . Loopback adapterB . Cable testerC . Tone generatorD ....

May 31, 2018 No Comments READ MORE +