Which of the following standards is the BEST option to fit the requirements?

A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?A . GSMB . TDMC . CDMAD...

June 9, 2021 No Comments READ MORE +

Which of the following protocols do MOST MITM attacks utilize?

Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A

June 9, 2021 No Comments READ MORE +

Which of the following should the technician perform to discover possible interference?

A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?A . Site surveyB . Vulnerability scanningC . WardrivingD . Checking logical diagramE . Bandwidth testView AnswerAnswer:...

June 9, 2021 No Comments READ MORE +

Which of the following protocols is the technician MOST likely to consider?

A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)A . SIPB . NTPD . 323E . SMBF . ICMPG . RTPH . IPSec . RDPView AnswerAnswer: A,C,F

June 9, 2021 No Comments READ MORE +

Which of the following would BEST assist in recovering these devices?

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?A . Asset tracking tagsB . Motion detectorsC . Security guardsD . Computer locksView AnswerAnswer: D

June 9, 2021 No Comments READ MORE +

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A

June 9, 2021 No Comments READ MORE +

Which of the following tools would provide the information on TCP connections?

A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would provide the information on TCP connections?A . netstatB . tracertC . arpD . ipconfigE . routeView AnswerAnswer: A

June 9, 2021 No Comments READ MORE +

Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?

A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat...

June 8, 2021 No Comments READ MORE +

Which of the following should the technician choose that all the equipment would support?

A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the...

June 8, 2021 No Comments READ MORE +

Which of the following should the technician update to allow this functionality?

A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?A . Device softwareB ....

June 8, 2021 No Comments READ MORE +