Which of the following should be implemented to reduce the occurrences?

A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?A . ARP inspectionB . Intrusion detection systemC . Web content filteringD . Port filteringView AnswerAnswer: C Explanation: Ransomware is a type ofmalware which restricts access to the computer...

November 27, 2018 No Comments READ MORE +

Which of the following antenna types is BEST suited for this solution?

A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST...

November 26, 2018 No Comments READ MORE +

Which of the following should the technician do NEXT in the troubleshooting methodology?

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...

November 24, 2018 No Comments READ MORE +

Which of the following protocols was MOST likely used on this cable?

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?A . RS-232B . 802.3C . ATMD . TokenringView AnswerAnswer: A Explanation: A DB-9 connector is used on serial cables. Serial cables use...

November 24, 2018 No Comments READ MORE +

When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?

When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?A . Port mirroringB . 802.1wC . LACPD . VTPView AnswerAnswer: C Explanation: The Link Aggregation Control Protocol (LACP) enables you to assign multiple...

November 22, 2018 No Comments READ MORE +

Which of the following should the technician do NEXT in the troubleshooting methodology?

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...

November 21, 2018 No Comments READ MORE +

Which of the following would need to be configured on each network device to provide that information in a secure manner?

A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner?A . S/MIMEB . SYSLOGC . PGPD ....

November 18, 2018 No Comments READ MORE +

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

Which of the following is used to define how much bandwidth can be used by various protocols on the network?A . Traffic shapingB . High availabilityC . Load balancingD . Fault toleranceView AnswerAnswer: A Explanation: If a network connection becomes saturated to the point where there is a significant level...

November 18, 2018 No Comments READ MORE +

Which of the following BEST describes these actions?

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions?A . Network mapB . Asset...

November 18, 2018 No Comments READ MORE +

Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?A . Install host-based anti-malware...

November 17, 2018 No Comments READ MORE +