Which of the following should the technician choose that all the equipment would support?
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the...
Which of following is the FIRST step that a technician should take to troubleshoot the issue?
A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue?A . Identify the problem.B . Establish a plan of action to resolve the problem.C . Establish a theory of probable cause.D . Implement preventative...
Which of the following default services uses TCP/UDP port 88?
Which of the following default services uses TCP/UDP port 88?A . LDAPB . IGMPC . HTTPD . KerberosView AnswerAnswer: D
Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?
Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?A . ISDNB . MPLSC . PRID . Broadband cableE . Frame relayView AnswerAnswer: E
Which of the following port numbers needs to be redirected through the proxy server to accomplish this?
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this?A . 20B . 80C . 143D . 443View AnswerAnswer: B
Which of the following should the first responder do FIRST?
A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do FIRST?A . Document the sceneB . Take pictures upon arrivalC . Secure the areaD . Implement chain of custodyView AnswerAnswer: C
Which of the following is an example of two factor authentication?
Which of the following is an example of two factor authentication?A . Password, device certificate and PINB . SSL web server certificate and passwordC . User password and administrator passwordD . Password and hardware token OTPView AnswerAnswer: D
Which of the following is the MOST likely problem?
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likely problem?A . Faulty crossover cableB . DNS server is downC ....
Which of the following should be implemented in a networked environment carrying teleconferencing packets?
Which of the following should be implemented in a networked environment carrying teleconferencing packets?A . L2TPB . SSHC . QoSD . SNMPView AnswerAnswer: C
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?A . Time division multiplexingB . Analog circuit switchingC . CSMA/CDD . Time division spread spectrumView AnswerAnswer: A