Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?A . Fault toleranceB . Quality of serviceC . Load balancingD . Port aggregationView AnswerAnswer: A

October 30, 2021 No Comments READ MORE +

Which of the following protocols should the organization use to allow for authentication, authorization and auditing?

An organization wants to implement a method of centrally managing logins to network services . Which of the following protocols should the organization use to allow for authentication, authorization and auditing?A . MS-CHAPB . RADIUSC . LDAPSD . RSTPView AnswerAnswer: A

October 30, 2021 1 Comment READ MORE +

Which of the following describes the issue?

A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the...

October 30, 2021 No Comments READ MORE +

Which of the following describes the reason why the events are not being received?

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are not...

October 30, 2021 No Comments READ MORE +

On which of the following solutions would the technician MOST likely train the employee?

A city has hired a new employee who needs to be able to work when traveling at home and at the municipal sourcing of a neighboring city that snares services. The employee is issued a laptop, and a technician needs to train the employee on the appropriate solutions for secure...

October 29, 2021 No Comments READ MORE +

At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?

A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G ....

October 29, 2021 No Comments READ MORE +

Which of the following commands should the technician run?

A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers . Which of the following commands should the technician run?A . ipconfigB . nslookupC . arpD . routeView AnswerAnswer: B

October 29, 2021 No Comments READ MORE +

Which of the following pieces of equipment would be able to handle this requirement?

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections. Which of the following pieces of equipment would be able to handle this requirement?A . A VPN concentratorB . A load balancerC...

October 28, 2021 No Comments READ MORE +

Which of the following should the technician configure on the switch to prevent unintended connections?

A technician is configuring a network switch to be used in a publicly accessible location . Which of the following should the technician configure on the switch to prevent unintended connections?A . DHCP snoopingB . GeofencingC . Port securityD . Secure SNMPView AnswerAnswer: C

October 28, 2021 No Comments READ MORE +

Which of the following policies should the network administrator implements to BEST mitigate this issue?

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs . Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portalB . Two-factor authenticationC . Complex passwordsD . GeofencingE . Role-based accessF . Explicit...

October 27, 2021 No Comments READ MORE +