Which of the following protocols is used by Active Directory for authentication?

Which of the following protocols is used by Active Directory for authentication?A . SSHB . SFTPC . LDAPD . TLSView AnswerAnswer: C

September 1, 2021 No Comments READ MORE +

Which of the following Is MOST likely the issue?

A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator....

September 1, 2021 No Comments READ MORE +

Which of the following techniques should be used to prevent unauthorized access?

A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)A . Disabling unused portsB . Upgrading firmwareC . Using secure protocolsD . File hashingE . MAC filteringF . Configuring a honeypotView AnswerAnswer: A,E

August 31, 2021 No Comments READ MORE +

Which of the following performance issues is the company facing?

A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing?A . JitterB . LatencyC...

August 31, 2021 No Comments READ MORE +

Which of the following documents or regulations should be consulted for confirmation?

When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation?A . Incident response policyB . International export controlsC . Data loss preventionD . Remote access...

August 31, 2021 No Comments READ MORE +

Which of the following OSI layers do TCP and UDP operate within?

Which of the following OSI layers do TCP and UDP operate within?A . Data linkB . NetworkC . SessionD . TransportE . PresentationF . ApplicationView AnswerAnswer: D

August 31, 2021 No Comments READ MORE +

Which of the following actions will improve the quality of the voice calls?

After deployment of a second network link to load balance the network traffic, the quality of voice calls degrades. The network administrator discovers the voice packets are arriving at uneven intervals that cannot be handled by the voice application buffer. Which of the following actions will improve the quality of...

August 31, 2021 No Comments READ MORE +

The process of searching for open or weakly secured wireless networks in a geographic area is known as:

The process of searching for open or weakly secured wireless networks in a geographic area is known as:A . phishing.B . social engineering.C . war driving.D . an evil twin.View AnswerAnswer: C

August 31, 2021 No Comments READ MORE +

Which of the following should the technician use to troubleshoot?

A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company's firewall. Which of the following should the technician use to troubleshoot?A . WiFi...

August 31, 2021 No Comments READ MORE +

Which of the following new devices would be required at the demarcation points?

Two buildings used to be connected by a wireless bridge, but they are upgrading to fiber. Which of the following new devices would be required at the demarcation points?A . Wireless access pointB . RouterC . Media converterD . FirewallView AnswerAnswer: C

August 30, 2021 No Comments READ MORE +