Which of the following should Kim enable to ensure that the network only allows 802.11n clients?

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?A . Name the SSID on the 802.11n network onlyB . Limit the DHCP address poolC . Disable 802.11b and 802.11gD . Only use WPA encryptionView...

February 14, 2018 No Comments READ MORE +

Which of the following should the user do to help with signal strength?

A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength?A . Call the wireless provider and ask for a T3 circuit.B . Move the wireless router to a better location where line of...

February 14, 2018 No Comments READ MORE +

Which of the following is causing the problem?

A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?A . The WAP antenna is damagedB...

February 13, 2018 No Comments READ MORE +

Which of the following DNS records allows for reverse lookup of a domain?

Which of the following DNS records allows for reverse lookup of a domain?A . PTRB . AAAAC . AD . MXView AnswerAnswer: A

February 13, 2018 No Comments READ MORE +

Which of the following has MOST likely occurred?

A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?A . Port security is blocking all traffic.B . An IDS is blocking all traffic.C . Implicit deny is blocking all traffic.D . SMTP is blocking...

February 12, 2018 No Comments READ MORE +

Which of the following could be used to stop unknown threats?

Which of the following could be used to stop unknown threats?A . DMZB . Signature based IPSC . Behavior based IPSD . HoneypotsView AnswerAnswer: C

February 12, 2018 No Comments READ MORE +

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?A . MAC address reservationB . Static IP addressC . IP address exclusionD . Custom DNS server entryView AnswerAnswer: A

February 11, 2018 No Comments READ MORE +

Which of the following commands would MOST likely be used on that workstation to verify its current network settings?

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?A . net shareB . hostnameC . ipconfigD . tracertView...

February 10, 2018 No Comments READ MORE +

Which of the following would Lisa, a technician, use to study network traffic?

There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?A . Protocol analyzerB . Cable testerC . Cable certifierD . Environmental monitorView AnswerAnswer: A

February 10, 2018 No Comments READ MORE +

Which of the following security mechanisms has the technician enforced?

A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?A . DLPB . IDSC . WAFD . WPAE . TPMView AnswerAnswer: C

February 10, 2018 No Comments READ MORE +