Which of the following provides the MOST protection against zero day attacks via email attachments?
Which of the following provides the MOST protection against zero day attacks via email attachments?A . Anti-spamB . Anti-virusC . Host-based firewallsD . Patch managementView AnswerAnswer: A
Which of the following indicates the correct IP address range?
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?A . 172.16.80.0-172.16.85.254B . 172.16.80.0-172.16.88.255C . 172.16.80.1-172.16.87.254D . 172.16.80.1-172.16.85.255View AnswerAnswer: C
Which of the following is the MOST likely explanation?
A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the...
Which of the following should the technician do to make a crossover cable before crimping the new plug?
A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off...
When enabling jumbo frames on a network device, which of the following parameters is being adjusted?
When enabling jumbo frames on a network device, which of the following parameters is being adjusted?A . SpeedB . DuplexC . MTUD . TTLView AnswerAnswer: C
Which of the following steps would MOST likely correct this issue?
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not...
Which of the following protocols is used for remote management of devices?
Which of the following protocols is used for remote management of devices?A . SNMPB . TFTPC . SyslogD . SMTPView AnswerAnswer: A
A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?
A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?A . LLDPB . VLAN taggingC . QoSD . SIP trunkingView AnswerAnswer: C
Which of the following media types should be recommended for the customer using only a single switch?
A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?A . Fiber opticB . WirelessC...
The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:
The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:A . CARPB . QoSC . Traffic shaping.D . Fault tolerance.View AnswerAnswer: B