Which of the following connectors provides console access to a switch?
Which of the following connectors provides console access to a switch?A . STB . RJ45C . BNCD . SFPView AnswerAnswer: B Explanation: Console Access: Purpose: Console access to a switch allows administrators to configure and manage the device directly. This is typically done using a terminal emulator program on a...
Which of the following protocols has a default administrative distance value of 90?
Which of the following protocols has a default administrative distance value of 90?A . RIPB . EIGRPC . OSPFD . BGPView AnswerAnswer: B Explanation: EIGRP (Enhanced Interior Gateway Routing Protocol) has a default administrative distance (AD) value of 90 for internal routes. The administrative distance is used to rate the...
Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?
Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?A . Logical diagramB . Layer 3 network diagramC . Service-level agreementD . Heat mapView AnswerAnswer: D Explanation: Definition of Heat Maps: A heat map is a graphical representation of data where individual values...
Which of the following is a user benefit of ESSID compared to SSID?
A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?A . Stronger wireless connectionB . Roaming between access pointsC . Advanced securityD . Increased throughputView AnswerAnswer: B Explanation: An Extended Service Set Identifier (ESSID) allows multiple...
Which of the following describes the function of a MIB?
An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?A . DHCP relay deviceB . Policy enforcement pointC . Definition file for event translationD . Network access...
Which of the following Is most likely the root cause?
A virtual machine has the following configuration: • IPv4 address: 169.254.10.10 • Subnet mask: 255.255.0.0 The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?A . The subnet mask is incorrect.B . The DHCP server...
Which of the following should be implemented to comply with the cease-and-desist order?
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?A . MAC securityB . Content filteringC . Screened subnetD . Perimeter networkView AnswerAnswer: B Explanation: Content filtering can be used to block or restrict...
Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?
Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?A . MTTRB . RTOC . RPOD . MTBFView AnswerAnswer: C Explanation: Definition of RPO: Recovery Point Objective (RPO) is a disaster recovery metric that describes the maximum acceptable...