Which of the following devices would be used to manage a corporate WLAN?

Which of the following devices would be used to manage a corporate WLAN?A . A wireless NAS B. A wireless bridge C. A wireless router D. A wireless controllerView AnswerAnswer: D

December 23, 2022 No Comments READ MORE +

Which of the following policies should the network administrator implements to BEST mitigate this issue?

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portal B. Two-factor authentication C. Complex passwords D. Geofencing E. Role-based access F. Explicit denyView...

December 23, 2022 No Comments READ MORE +

Which of the following should the technician utilize for the switch?

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?A . MIB B. Trap C....

December 22, 2022 No Comments READ MORE +

Which of the following will the network administrator MOST likely use to ensure smooth video delivery?

A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery?A . Link aggregation control B. Port tagging C. Jumbo frames D. Media access controlView AnswerAnswer: C

December 22, 2022 No Comments READ MORE +

Which of the following access methods would provide the BEST security for this new datacenter?

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computing B. Secure Socket Shell C. In-band...

December 22, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port...

December 22, 2022 No Comments READ MORE +

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?A . Establish a plan of action to resolve the issue and identify potential effects B. Verify full system functionality and, if applicable, implement preventive measures C. Implement...

December 22, 2022 No Comments READ MORE +

Which of the following would be BEST to use to detect a MAC spoofing attack?

Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access ProtocolView AnswerAnswer: B

December 22, 2022 No Comments READ MORE +

Which of the following needs to be configured for these networks to reach each other?

A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?A . Network address translation B. Default gateway C. Loopback D. Routing protocolView AnswerAnswer: B

December 22, 2022 No Comments READ MORE +

Which of the following systems would MOST likely be found in a screened subnet?

Which of the following systems would MOST likely be found in a screened subnet?A . RADIUS B. FTP C. SQL D. LDAPView AnswerAnswer: B

December 22, 2022 No Comments READ MORE +