Which of the following should be implemented?
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?A . StarB . MeshC . BusD . RingView AnswerAnswer: D
Which of the following tools would be MOST appropriate for this scenario?
A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario?A . CrimperB . OTDRC . Throughput testerD . Punch down toolView AnswerAnswer: D
Which of the following uses types and codes rather than ports?
Which of the following uses types and codes rather than ports?A . EIGRPB . ICMPC . UDPD . IPv6View AnswerAnswer: B
Which of the following devices should a network administrator configure on the outermost part of the network?
Which of the following devices should a network administrator configure on the outermost part of the network?A . Media converterB . SwitchC . ModemD . FirewallView AnswerAnswer: D
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?A . 20B . 21C . 23D . 25View AnswerAnswer: D
Which of the following BEST describes what the network designer was referring to?
A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?A . Bad connectorsB . Cross-talkC...
When using high bandwidth applications over multiple WAN connections, which of the following should be used?
When using high bandwidth applications over multiple WAN connections, which of the following should be used?A . Static IP addressingB . Half-duplexC . PoE devicesD . Load balancingView AnswerAnswer: D
Which of the following provides the ability to deploy consistent access point configurations from a central location?
Which of the following provides the ability to deploy consistent access point configurations from a central location?A . Wireless controllerB . AAA serverC . WiFi-protected setupD . Proxy serverE . VPN concentratorView AnswerAnswer: A
Which of the following technologies allows for redundant links within a Layer 2 segment?
Which of the following technologies allows for redundant links within a Layer 2 segment?A . OSPFB . RIPC . Port MirroringD . Spanning TreeView AnswerAnswer: D