A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?A . Time division multiplexingB . Analog circuit switchingC . CSMA/CDD . Time division spread spectrumView AnswerAnswer: A
Which of the following should the network technician use to help identify the appropriate cable?
A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?A . Tone generatorB . MultimeterC ....
Which of the following devices should a network administrator configure on the outermost part of the network?
Which of the following devices should a network administrator configure on the outermost part of the network?A . Media converterB . SwitchC . ModemD . FirewallView AnswerAnswer: D
Which of the following network topologies do these represent?
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)A . Point-to-multipointB . BusC . Point-to-pointD . MeshE . Peer-peerF . RingView AnswerAnswer: C,D
Which of the following will allow the request to be fulfilled without breaking the corporate policy?
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?A . DHCP relayB . DHCP exclusionC...
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?A . STPB . RTPC . RIPD . NTPE . SIPView AnswerAnswer: C
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:A . penetration testingB . vulnerability scanningC . reconnaissanceD . social engineeringView AnswerAnswer: A
Which of the following policies should be followed?
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?A . Change management policyB . Remote access policyC . Acceptable use policyD . Memorandum of understandingView AnswerAnswer: A
Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?
A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?A...
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?A . DSLB . POTSC . T1D . DOCSISView AnswerAnswer: C