Which of the following is a Layer 2 access control the technician should implement?
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?A . Access control listsB . Captive portalC . WPA2D . Port securityView AnswerAnswer: D
Which of the following is MOST effective in resolving this issue?
A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and...
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?A . NDAB . IRPC . BYODD . SLAView AnswerAnswer: C
According to the OSI model, at which of the following layers is data encapsulated into a packet?
According to the OSI model, at which of the following layers is data encapsulated into a packet?A . Layer 2B . Layer 3C . Layer 4D . Layer 5E . Layer 6View AnswerAnswer: B
Which of the following should the CIO complete?
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of...
Which of the following should the technician do FIRST to reconnect the server to the network?
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the...
Which of the following should the IT staff reference to determine the location of the equipment being moved?
A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved?A ....
Which of the following is MOST likely the cause?
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is...
Which of the following is the address of the customer’s router?
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?A . 192.168.0.55B . 192.168.1.0C . 192.168.1.1D . 192.168.5.5E . 255.255.255.0View AnswerAnswer: C
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?A . 10.8.0.0/16B . 10.8.0.0/19C . 10.8.0.0/20D . 10.0.0.0/24View AnswerAnswer: A