The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?

The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?A . Quarantine networkB . Persistent agentsC . Posture assessmentD . Non-persistent agentsView AnswerAnswer: C Explanation: Network Admission Control (NAC) can...

December 30, 2018 No Comments READ MORE +

Which of the following would the technician MOST likely configure?

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?A . Hardware firewallB . Proxy serverC . Software firewallD . GRE tunnelingView AnswerAnswer: C Explanation: A...

December 29, 2018 No Comments READ MORE +

Which of the following tools can be used to locate its physical location within the wall?

A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall?A . Cable certifierB . MultimeterC . Cable testerD...

December 28, 2018 No Comments READ MORE +

Which of the following should the network technician do NEXT?

Topic 4, Troubleshooting A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A . Establish a theory of probable cause.B . Document actions and findings.C . Determine next steps...

December 24, 2018 No Comments READ MORE +

Which of the following network topologies has a central, single point of failure?

Which of the following network topologies has a central, single point of failure?A . RingB . StarC . HybridD . MeshView AnswerAnswer: B Explanation: A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form...

December 22, 2018 No Comments READ MORE +

Which of the following physical security controls prevents an attacker from gaining access to a network closet?

Which of the following physical security controls prevents an attacker from gaining access to a network closet?A . CCTVsB . Proximity readersC . Motion sensorsD . IP camerasView AnswerAnswer: B Explanation: A proximity card is a physical card which used to get access to a physical area such as a...

December 21, 2018 No Comments READ MORE +

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?A . The VoIP phone would request a new phone number from the unified communications server.B . The VoIP phone...

December 20, 2018 No Comments READ MORE +

Which of the following would BEST handle the rerouting caused by the disruption of service?

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?A . Layer 3 switchB . Proxy serverC . Layer 2 switchD . Smart...

December 17, 2018 No Comments READ MORE +

Which of the following would be identified as physical security controls?

During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).A . RSAB . PasswordsC . Man trapsD . BiometricsE ....

December 17, 2018 No Comments READ MORE +

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?A . The OSPF not-so-stubby...

December 16, 2018 No Comments READ MORE +