Which of the following protocols can be both connection-oriented and connectionless?

Which of the following protocols can be both connection-oriented and connectionless?A . 20 FTPB . 53 DNSC . 67 DHCPD . 80 HTTPView AnswerAnswer: B

February 22, 2018 No Comments READ MORE +

Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

Which of the following connector types would Sandy, a network technician, use to connect a serial cable?A . RJ-11B . BNCC . LCD . DB-9View AnswerAnswer: D

February 21, 2018 No Comments READ MORE +

Which of the following protocols is used to securely connect to a multi-layer switch?

Which of the following protocols is used to securely connect to a multi-layer switch?A . HTTPB . SMTPC . SSHD . TelnetView AnswerAnswer: C

February 21, 2018 No Comments READ MORE +

Which of the following cloud services is the administrator using?

An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. Which of the following cloud services is the administrator using?A . Community PaaSB . Public IaasC . Hybrid...

February 18, 2018 No Comments READ MORE +

Which of the following should the company deploy to ensure excellent TV and telephone service?

A national cable company providing TV, telephone, and Internet service to home users over its IP network, has been tracking a large increase of network bandwidth due to P2P file sharing. Which of the following should the company deploy to ensure excellent TV and telephone service?A . QoSB . Load...

February 18, 2018 No Comments READ MORE +

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?A . Establish a plan of action to resolve the problem and identify potential effects.B . Implement the solution.C . Establish a theory of probable cause.D . Document findings, actions,...

February 18, 2018 No Comments READ MORE +

Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this?

A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO).A . 20B . 80C . 143D . 443E . 8080View AnswerAnswer: B,D

February 18, 2018 No Comments READ MORE +

Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?

Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?A . PoE settings and VTP configurationB . SNMP configuration onlyC . IP address and SNMP...

February 18, 2018 No Comments READ MORE +

Which of the following options would satisfy these requirements?

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?A . Add a router and enable OSPC . Add a layer 3 switch and create a VLAE . Add...

February 17, 2018 No Comments READ MORE +

Which of the following issues should be reviewed to help the user to connect to the wireless network?

A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users’ laptops. Which of the following issues should be reviewed...

February 16, 2018 No Comments READ MORE +