Which of the following devices would be used to manage a corporate WLAN?
Which of the following devices would be used to manage a corporate WLAN?A . A wireless NAS B. A wireless bridge C. A wireless router D. A wireless controllerView AnswerAnswer: D
Which of the following policies should the network administrator implements to BEST mitigate this issue?
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portal B. Two-factor authentication C. Complex passwords D. Geofencing E. Role-based access F. Explicit denyView...
Which of the following should the technician utilize for the switch?
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?A . MIB B. Trap C....
Which of the following will the network administrator MOST likely use to ensure smooth video delivery?
A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery?A . Link aggregation control B. Port tagging C. Jumbo frames D. Media access controlView AnswerAnswer: C
Which of the following access methods would provide the BEST security for this new datacenter?
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computing B. Secure Socket Shell C. In-band...
CORRECT TEXT
CORRECT TEXT You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port...
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?A . Establish a plan of action to resolve the issue and identify potential effects B. Verify full system functionality and, if applicable, implement preventive measures C. Implement...
Which of the following would be BEST to use to detect a MAC spoofing attack?
Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access ProtocolView AnswerAnswer: B
Which of the following needs to be configured for these networks to reach each other?
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?A . Network address translation B. Default gateway C. Loopback D. Routing protocolView AnswerAnswer: B
Which of the following systems would MOST likely be found in a screened subnet?
Which of the following systems would MOST likely be found in a screened subnet?A . RADIUS B. FTP C. SQL D. LDAPView AnswerAnswer: B