Which of the following would MOST likely be used to review previous upgrades to a system?
Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity plan B. Change management C. System life cycle D. Standard operating proceduresView AnswerAnswer: B
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?A . PaaS B. IaaS C. SaaS D. Disaster recovery as a Service (DRaaS)View AnswerAnswer: B
Which of the following should a wireless technician do NEXT to troubleshoot this issue?
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a...
Which of the following BEST describes this deployment?
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?A . Extended service set B. Basic service set C. Unified service set...
At which of the following OSI model layers would a technician find an IP header?
At which of the following OSI model layers would a technician find an IP header?A . Layer 1 B. Layer 2 C. Layer 3 D. Layer 4View AnswerAnswer: C
Which of the following describes the reason why the events are not being received?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are...
Which of the following protocols should the organization use to allow for authentication, authorization and auditing?
An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?A . MS-CHAP B. RADIUS C. LDAPS D. RSTPView AnswerAnswer: A
Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?A . OTDR B. Tone generator C. Fusion splicer D. Cable tester E. PoE injectorView AnswerAnswer: A
Which of the following would be MOST affected by this statistic?
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?A . A VoIP sales call with a...
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?A . Establish a plan of action to resolve the issue and identify potential effects B. Verify full system functionality and, if applicable, implement preventive measures C. Implement...