Which of the following network topologies typically has all devices on a network directly connected to every other network device?
Which of the following network topologies typically has all devices on a network directly connected to every other network device?A . MeshB . StarC . Ad hocD . RingView AnswerAnswer: A
Which of the following can be used to prevent unauthorized employees from entering restricted areas?
Which of the following can be used to prevent unauthorized employees from entering restricted areas?A . Sign-in sheetsB . Video camerasC . Motion sensorsD . Swipe badgesView AnswerAnswer: D
Which of the following is the MOST likely cause of this issue?
A network engineer created a guest wireless network named "Visitor" for clients to use when they are on site. After a couple of months, visiting clients state they cannot access the Internet after connecting to the "Visitor" wireless network, even though configuration changes have not been made . Which of...
Which of the following should the technician attempt NEXT?
A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up . Which of the...
Which of the following steps is the technician most likely to complete FIRST?
A company has procured a new office building and started the process of assigning employees to work at that location. The company has also purchased equipment for the new location. There are 5033 laptops, 6000 monitors, and 857 printers . Which of the following steps is the technician most likely...
Which of the following would mitigate this issue?
A network manager is concerned about visitors taking advantage of open cubicles at a company's facilities . Which of the following would mitigate this issue?A . Create a VLAN for all unused switchportsB . Implement a DM2 for all external servicesC . Implement root guard on all switchesD . Create...
Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?
Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?A . Powerline extenderB . Ethernet-over-power adapterC . Power-over-Ethernet switchD . Power distribution unitE . Ethernet power controllerView AnswerAnswer: C
Which of the following could be occurring?
An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate . Which of the following could be occurring?A . PhishingB . DDoSC . Evil twinD . MITME . OCSP staplingView AnswerAnswer: C
Which of the following is the MOST likely cause?
A bookstore uses a Faraday cage to comply with credit card regulations Customers report that their cellular phones have no signal when they are in the bookstore. Which of the following is the MOST likely cause?A . The Faraday cage is creating interference within the bookstoreB . The Faraday cage...
Which of the following commands should a network administrator use to confirm the help desk technician's claim?
The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack . Which of the following commands should a network administrator use to confirm the help desk technician's...