Which of the following should the technician enable?

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?A . PoEB . Port bondingC . VLAND . TrunkingView AnswerAnswer: A Explanation: Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards. PoE allows an Ethernet switch...

December 16, 2018 No Comments READ MORE +

Given this information, which of the following is the cause of the problem?

A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port...

December 12, 2018 No Comments READ MORE +

Which of the following is the MOST likely reason for the problem?

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?A . Username is...

December 12, 2018 No Comments READ MORE +

Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to?

A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to?A . nbtstat CaB . show mac address-tableC . show interface...

December 8, 2018 No Comments READ MORE +

Which of the following procedures should the system administrator perform FIRST?

A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST?A . Remove all user accounts on the serverB . Isolate the server logically on the networkC . Block all HTTP traffic to the serverD . Install...

December 8, 2018 No Comments READ MORE +

Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the...

December 7, 2018 No Comments READ MORE +

Which of the following is an example of an IPv4 address?

Which of the following is an example of an IPv4 address?A . 192:168:1:55B . 192.168.1.254C . 00:AB:FA:B1:07:34D . ::1View AnswerAnswer: B Explanation: AnIPv4 address is notated as four decimal numbers each between 0 and 255 separated by dots (xxx.xxx.xxx.xxx). Each number is known as an octet as it represents eight...

December 6, 2018 No Comments READ MORE +

This is an example of which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?A . Smurf attackB . VLAN hoppingC . BluesnarfingD . Spear phishingView AnswerAnswer: B Explanation: The VoIP phone port can be used to attack...

December 4, 2018 No Comments READ MORE +

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?A . Multilayer switchB . Access pointC . Analog modemD . DOCSIS modemView AnswerAnswer: C Explanation: Before ADSL broadband connections became the standard for Internet connections, computers used...

December 2, 2018 No Comments READ MORE +

Which of the following systems should be used?

After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?A . Event logB . SyslogC . SIEMD . SNMPView AnswerAnswer: C Explanation: Using a Security information and event management (SIEM) product, the security logs...

December 2, 2018 No Comments READ MORE +