Which of the following protocols is used by Active Directory for authentication?
Which of the following protocols is used by Active Directory for authentication?A . SSHB . SFTPC . LDAPD . TLSView AnswerAnswer: C
Which of the following Is MOST likely the issue?
A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator....
Which of the following techniques should be used to prevent unauthorized access?
A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)A . Disabling unused portsB . Upgrading firmwareC . Using secure protocolsD . File hashingE . MAC filteringF . Configuring a honeypotView AnswerAnswer: A,E
Which of the following performance issues is the company facing?
A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing?A . JitterB . LatencyC...
Which of the following documents or regulations should be consulted for confirmation?
When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation?A . Incident response policyB . International export controlsC . Data loss preventionD . Remote access...
Which of the following OSI layers do TCP and UDP operate within?
Which of the following OSI layers do TCP and UDP operate within?A . Data linkB . NetworkC . SessionD . TransportE . PresentationF . ApplicationView AnswerAnswer: D
Which of the following actions will improve the quality of the voice calls?
After deployment of a second network link to load balance the network traffic, the quality of voice calls degrades. The network administrator discovers the voice packets are arriving at uneven intervals that cannot be handled by the voice application buffer. Which of the following actions will improve the quality of...
The process of searching for open or weakly secured wireless networks in a geographic area is known as:
The process of searching for open or weakly secured wireless networks in a geographic area is known as:A . phishing.B . social engineering.C . war driving.D . an evil twin.View AnswerAnswer: C
Which of the following should the technician use to troubleshoot?
A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company's firewall. Which of the following should the technician use to troubleshoot?A . WiFi...
Which of the following new devices would be required at the demarcation points?
Two buildings used to be connected by a wireless bridge, but they are upgrading to fiber. Which of the following new devices would be required at the demarcation points?A . Wireless access pointB . RouterC . Media converterD . FirewallView AnswerAnswer: C