Which of the following troubleshooting steps should the electrician take first?
After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?A . Inspect the connectors for any wires that are touching or exposed.B . Restore default settings on...
Which of the following technologies would most likely mitigate this issue?
A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).A . Mesh networkB . 5GHz frequencyC . Omnidirectional antennaD . Non-overlapping channelE . Captive portalF . Ad hoc networkView AnswerAnswer: B Explanation: Understanding 2.4GHz Interference:...
Which of the following does a full-tunnel VPN provide?
Which of the following does a full-tunnel VPN provide?A . Lower bandwidth requirementsB . The ability to reset local computer passwordsC . Corporate Inspection of all network trafficD . Access to blocked sitesView AnswerAnswer: C Explanation: A full-tunnel VPN routes all of a user's network traffic through the corporate network....
Which of the following would fulfill this requirement?
A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?A . Jumbo framesB . 802.1Q taggingC . Native VLAND . Link aggregationView AnswerAnswer: B Explanation:
Which of the following is the most secure way to provide site-to-site connectivity?
Which of the following is the most secure way to provide site-to-site connectivity?A . VXLANB . IKEC . GRED . IPsecView AnswerAnswer: D Explanation: IPsec (Internet Protocol Security) is the most secure way to provide site-to-site connectivity. It provides robust security services, such as data integrity, authentication, and encryption, ensuring...
Which of the following will achieve this goal?
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?A . GREB . IKEC . ESPD . AHView AnswerAnswer: C Explanation: Definition of ESP (Encapsulating Security Payload): ESP is a part of...
Which of the following network devices converts wireless signals to electronic signals?
Which of the following network devices converts wireless signals to electronic signals?A . RouterB . FirewallC . Access pointD . Load balancerView AnswerAnswer: C Explanation: Role of an Access Point (AP): Wireless to Wired Conversion: An access point (AP) is a device that allows wireless devices to connect to a...
Which of the following subnet masks should the administrator use?
A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?A . 255.255.0.0B . 255.255.254.0C . 255.255.255.0D . 255.255.255.128View AnswerAnswer: D Explanation: Understanding Subnetting: Original Network: 192.168.1.0/24 has a subnet mask of 255.255.255.0, which allows for 256 IP addresses (including...
Which of the following is the most likely issue?
Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?A . The administrator did not provision enough IP addresses.B . The administrator configured an incorrect default gateway.C . The...
Which of the following commands should the technician use to identify the issue?
A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?A . tcpdumpB . digC . tracertD . arpView AnswerAnswer: C Explanation: The tracert...