Which of the following should the network administrator check FIRST?
A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST?A . Validate the roaming settings...
Which of the following steps will MOST likely determine the cause of the issue?
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the...
Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposesB . A duplication of a hosted virtual server to another physical server for redundancyC . A download of navigation data to...
Which of the following will the company MOST likely configure to improve performance for these applications?
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications?A . Link Aggregation Control ProtocolB . Dynamic routingC . Quality of serviceD . Network load balancerE . Static IP addressesView AnswerAnswer: C Explanation: To improve performance for...
Which of the following documents would MOST likely be created as a result of the site survey?
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?A . Physical diagramB . Heat mapC . Asset listD . Device mapView AnswerAnswer: B Explanation:...
Which of the following is used to prioritize Internet usage per application and per user on the network?
Which of the following is used to prioritize Internet usage per application and per user on the network?A . Bandwidth managementB . Load balance routingC . Border Gateway ProtocolD . Administrative distanceView AnswerAnswer: A Explanation: Bandwidth management is used to prioritize Internet usage per application and per user on the...
Which of the following routing protocols is used to exchange route information between public autonomous systems?
Which of the following routing protocols is used to exchange route information between public autonomous systems?A . OSPFB . BGPC . EGRIPD . RIPView AnswerAnswer: B Explanation: BGP (Border Gateway Protocol) is a routing protocol used to exchange route information between public autonomous systems (AS). OSPF (Open Shortest Path First),...
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:A . using a bottom-to-top approach.B . establishing a plan of action.C . documenting a finding.D . questioning the obvious.View AnswerAnswer:...
Which of the following should a network administrator configure to BEST prevent unauthorized access?
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...