Which of the following should be done to correct this issue?
Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this...
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?A . Multifactor authenticationB . ISAKMPC . TACACS+D . Network access controlView AnswerAnswer: C Explanation: TACACS+ (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting...
Which of the following should the technician do NEXT in the troubleshooting methodology?
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).A . RS-232B . 56k modemC . BluetoothD . CodecE . SIPView AnswerAnswer: D,E Explanation: The term "codec" is a concatenation of "encoder" and "decoder”. In video conferencing, a codec is software (or can be hardware)...
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?A . 66 blockB . BNCC . F-connectorD . RJ-11View AnswerAnswer: B Explanation: A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75...
Which of the following utilities will identify if the workstation uses DHCP?
An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP?A . tracertB . pingC . digD . ipconfigE . netstatView AnswerAnswer: D Explanation: The ipconfig command displays the TCP/IP configuration of a Windows system. The ipconfig /all command...
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following is a security benefit gained from setting up a guest wireless network?A . Optimized device bandwidthB . Isolatedcorporate resourcesC . Smaller ACL changesD . Reduced password resetsView AnswerAnswer: B Explanation: A wireless guest network could be set up so that it has limited access (no access...
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).A . OSPFB . VTP trunkingC . Virtual PBXD . RADIUSE . 802.1xView AnswerAnswer: D,E Explanation: D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user accounts and passwords...
A VLAN with a gateway offers no security without the addition of:
A VLAN with a gateway offers no security without the addition of:A . An ACC . 802.1w.D . A RADIUS server.E . 802.1d.View AnswerAnswer: A Explanation: A gateway in a VLAN connects to another network. The other network can be the Internet, another subnet on the network or another VLAN....
Network segmentation provides which of the following benefits?
Network segmentation provides which of the following benefits?A . Security through isolationB . Link aggregationC . Packet flooding through all portsD . High availability through redundancyView AnswerAnswer: A Explanation: Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network...