Which of the following BEST describes this deployment?

A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?A . Extended service setB . Basic service setC . Unified service setD...

September 9, 2024 No Comments READ MORE +

Which of the following would MOST likely be used to review previous upgrades to a system?

Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity planB . Change managementC . System life cycleD . Standard operating proceduresView AnswerAnswer: B Explanation: Change management is the process of reviewing previous upgrades to a system. It is a systematic...

September 9, 2024 No Comments READ MORE +

Which of the following can the administrator do to MOST easily mitigate this issue?

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levelsB . Adjust the wireless channelsC . Enable wireless...

September 8, 2024 No Comments READ MORE +

Which of the following ports is commonly used by VoIP phones?

Which of the following ports is commonly used by VoIP phones?A . 20B . 143C . 445D . 5060View AnswerAnswer: D Explanation: TCP/UDP port 5060 is commonly used by VoIP phones. It is the default port for SIP (Session Initiation Protocol), which is a signaling protocol that establishes, modifies, and...

September 8, 2024 No Comments READ MORE +

Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?

Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?A . NIC teamingB . Load balancerC . RAID arrayD . PDUsView AnswerAnswer: A Explanation: NIC teaming, also known as...

September 8, 2024 No Comments READ MORE +

Which of the following is the physical topology for an Ethernet LAN?

Which of the following is the physical topology for an Ethernet LAN?A . BusB . RingC . MeshD . StarView AnswerAnswer: D Explanation: In a star topology, all devices on a network connect to a central hub or switch, which acts as a common connection point. Ethernet LANs typically use...

September 8, 2024 No Comments READ MORE +

Which of the following systems would MOST likely be found in a screened subnet?

Which of the following systems would MOST likely be found in a screened subnet?A . RADIUSB . FTPC . SQLD . LDAPView AnswerAnswer: B Explanation: FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a...

September 7, 2024 No Comments READ MORE +

Which of the following will allow the technician to record these changes?

A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?A . Asset tagsB . A smart lockerC . An access control...

September 7, 2024 No Comments READ MORE +

Which of the following methods should the engineer select?

Must be vendor neutral Which of the following methods should the engineer select?A . TWP-RC4B . CCMP-AESC . EAP-TLSD . WPA2View AnswerAnswer: C Explanation: EAP-TLS is the method that should be selected to meet the requirements for designing a new secure wireless network. EAP-TLS (Extensible Authentication Protocol - Transport Layer...

September 7, 2024 No Comments READ MORE +

Which of the following should a network security administrator recommend to assist with detecting these activities?

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring.B . Change the default credentials.C...

September 6, 2024 No Comments READ MORE +