Which of the following storage network technologies inherently leverages block-level storage?
Which of the following storage network technologies inherently leverages block-level storage?A . NASB . SANC . FCoED . iSCSIE . FTPView AnswerAnswer: ABCD
Which of the following is MOST effective in resolving this issue?
A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and...
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).A . TELNETB . SSHC . RDPD . HTTPE . DNSF . FTPView AnswerAnswer: B,C
Which of the following is MOST likely the problem?
A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11ac router. The SSID, encryption and password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years ago....
At which of the following layers of the OSI model do packets exist?
At which of the following layers of the OSI model do packets exist?A . NetworkB . SessionC . Data linkD . TransportView AnswerAnswer: A
Which of the following should current network performance be compared against to determine network anomalies?
Which of the following should current network performance be compared against to determine network anomalies?A . BaselineB . Traffic analysisC . Packet captureD . LogsView AnswerAnswer: A
Which of the following should a technician investigate when using a network baseline to troubleshoot?
Which of the following should a technician investigate when using a network baseline to troubleshoot?A . Tracing a network wire connectivity issue from the datacenter to a host.B . Determining if the server performance is degraded.C . Changes that have been made to the network configuration.D . Location of networking...
Which of the following utilities would a technician use to determine the location of lost packets on a routed network?
Which of the following utilities would a technician use to determine the location of lost packets on a routed network?A . pingB . nslookupC . routeD . tracertView AnswerAnswer: D
Which of the following is the BEST action to take to meet the system requirements?
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to...
Which of the following would be the MOST secure way to harden this wireless network?
A customer has not been using security on a wireless network and has recently received many attacks through this vector. Which of the following would be the MOST secure way to harden this wireless network?A . Disable the SSIDB . WPA encryptionC . VLAN implementationD . WEP encryptionView AnswerAnswer: B