Which of the following is a Layer 2 access control the technician should implement?

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?A . Access control listsB . Captive portalC . WPA2D . Port securityView AnswerAnswer: D

March 18, 2021 No Comments READ MORE +

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?A . DSLB . POTSC . T1D . DOCSISView AnswerAnswer: C

March 18, 2021 No Comments READ MORE +

Which of the following solution sets properly addresses all of the identified requirements?

An engineer is reviewing the implement ation requirements for an upcoming project. The basic requirements identified by the customer include the following: - WLAN architecture supporting speeds in excess of 150 Mbps - Clientless remote network access - Port-based network access control Which of the following solution sets properly addresses...

March 18, 2021 No Comments READ MORE +

Which of the following protocols do MOST MITM attacks utilize?

Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A

March 17, 2021 No Comments READ MORE +

Which of the following should the technician use to reveal the location of the fault?

A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the...

March 17, 2021 No Comments READ MORE +

Which of the following security mechanisms has the technician enforced?

A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?A . DLPB . IDSC . WAFD . WPAE . TPMView AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?

Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?A . 0B . 1C . 2D . 6E . 12View AnswerAnswer: B

March 17, 2021 No Comments READ MORE +

Without the use of auto-sensing ports, which of the following cables should be used?

A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?A . Straight-throughB . ConsoleC . RolloverD . CrossoverView AnswerAnswer: D

March 17, 2021 No Comments READ MORE +

Considering this, which of the following is the BEST way for the company to connect these networks?

In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company b uses the following scheme: Subnet 1: 192.168.1.50/28 The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the...

March 17, 2021 No Comments READ MORE +

Which of the following is MOST likely issue with the cable?

A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the...

March 17, 2021 No Comments READ MORE +