Which of the following should a network administrator configure to BEST prevent unauthorized access?
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...
Which of the following is used to prioritize Internet usage per application and per user on the network?
Which of the following is used to prioritize Internet usage per application and per user on the network?A . Bandwidth managementB . Load balance routingC . Border Gateway ProtocolD . Administrative distanceView AnswerAnswer: A Explanation: Bandwidth management is used to prioritize Internet usage per application and per user on the...
Which of the following BEST describes how the switch processes this information?
A network technician is observing the behavior of an unmanaged switch when a new device is added to the network and transmits data. Which of the following BEST describes how the switch processes this information?A . The data is flooded out of every port. including the one on which it...
A technician is assisting a user who cannot connect to a network resource.
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:A . using a bottom-to-top approach.B . establishing a plan of action.C . documenting a finding.D . questioning the obvious.View AnswerAnswer:...
Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...
Which of the following should the systems administrator select to meet this requirement?
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?A . 802.11acB . 802.11axC ....
Which of the following technologies provides a failover mechanism for the default gateway?
Which of the following technologies provides a failover mechanism for the default gateway?A . FHRPB . LACPC . OSPFD . STPView AnswerAnswer: A Explanation: First Hop Redundancy Protocol (FHRP) provides a failover mechanism for the default gateway, allowing a backup gateway to take over if the primary gateway fails. Reference:...
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSOB . TACACS+C . Zero TrustD . Separation of dutiesE . Multifactor authenticationView AnswerAnswer: B Explanation: TACACS+ (Terminal Access Controller Access Control System Plus) can be used to...
Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?A . 2.4GHzB . 5GHzC . 6GHzD . 900MHzView...
Which of the following ports is commonly used by VoIP phones?
Which of the following ports is commonly used by VoIP phones?A . 20B . 143C . 445D . 5060View AnswerAnswer: D Explanation: TCP/UDP port 5060 is commonly used by VoIP phones. It is the default port for SIP (Session Initiation Protocol), which is a signaling protocol that establishes, modifies, and...