Which of the following metrics will MOST accurately show the underlying performance issues?

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usageB ....

December 25, 2023 No Comments READ MORE +

Which of the following is MOST likely the cause?

A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of...

December 24, 2023 No Comments READ MORE +

Which of the following features should be configured to allow different wireless access through the same equipment?

A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?A . MIMOB . TKIPC . LTED . SSIDView AnswerAnswer: D Explanation: SSID (Service Set Identifier)...

December 24, 2023 No Comments READ MORE +

Which of the following policies should the network administrator implements to BEST mitigate this issue?

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portalB . Two-factor authenticationC . Complex passwordsD . GeofencingE . Role-based accessF . Explicit denyView...

December 24, 2023 No Comments READ MORE +

Which of the following is used to track and document various types of known vulnerabilities?

Which of the following is used to track and document various types of known vulnerabilities?A . CVEB . Penetration testingC . Zero-dayD . SIEME . Least privilegeView AnswerAnswer: A Explanation: CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to...

December 24, 2023 No Comments READ MORE +

Which of the following should the technician utilize for the switch?

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?A . MIBB . TrapC ....

December 24, 2023 No Comments READ MORE +

Which of the following metrics should the technician check to begin troubleshooting the issue?

A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?A . Audit logsB . CPU utilizationC . CRC errorsD . JitterView AnswerAnswer: B...

December 24, 2023 No Comments READ MORE +

''Who is 192.168.1.200?

An ARP request is broadcasted and sends the following request. ''Who is 192.168.1.200? Tell 192.168.1.55'' At which of the following layers of the OSI model does this request operate?A . ApplicationB . Data linkC . TransportD . NetworkE . SessionView AnswerAnswer: B Explanation: An ARP request operates at the data...

December 24, 2023 No Comments READ MORE +

Which of the following antenna types should the AP utilize?

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?A . OmniB . DirectionalC . YagiD . ParabolicView AnswerAnswer: A Explanation: An omni antenna should be used by...

December 23, 2023 No Comments READ MORE +

Which of the following should a network administrator configure to BEST prevent unauthorized access?

There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...

December 23, 2023 No Comments READ MORE +