Which of the following steps will MOST likely determine the cause of the issue?
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times . Which of the following steps will MOST likely determine the cause of...
Which of the following will the company MOST likely configure to improve performance for these applications?
Branch users are experiencing issues with videoconferencing . Which of the following will the company MOST likely configure to improve performance for these applications?A . Link Aggregation Control ProtocolB . Dynamic routingC . Quality of serviceD . Network load balancerE . Static IP addressesView AnswerAnswer: C
Which of the following does this BEST describe?
An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company...
Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages?
Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages?A . SyslogB . Session Initiation ProtocolC . Secure File Transfer ProtocolD . Server Message BlockView AnswerAnswer: A
Which of the following should the technician configure on the switch to prevent unintended connections?
A technician is configuring a network switch to be used in a publicly accessible location . Which of the following should the technician configure on the switch to prevent unintended connections?A . DHCP snoopingB . GeofencingC . Port securityD . Secure SNMPView AnswerAnswer: C
Which of the following should a network technician do FIRST?
A user reports being unable to access network resources after making some changes in the office . Which of the following should a network technician do FIRST?A . Check the system’s IP addressB . Do a ping test against the serversC . Reseat the cables into the back of the...
Which of the following features should be configured to allow different wireless access through the same equipment?
A store owner would like to have secure wireless access available for both business equipment and patron use . Which of the following features should be configured to allow different wireless access through the same equipment?A . MIMOB . TKIPC . LTED . SSIDView AnswerAnswer: D
Within the realm of network security, Zero Trust:
Within the realm of network security, Zero Trust:A . prevents attackers from moving laterally through a system.B . allows a server to communicate with outside networks without a firewall.C . block malicious software that is too new to be found in virus definitions.D . stops infected files from being downloaded...
Which of the following ports is commonly used by VoIP phones?
Which of the following ports is commonly used by VoIP phones?A . 20B . 143C . 445D . 5060View AnswerAnswer: D
Which of the following BEST describes this deployment?
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access . Which of the following BEST describes this deployment?A . Extended service setB . Basic service setC . Unified service...