Which of the following should be implemented?

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A

January 29, 2018 No Comments READ MORE +

Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?

Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?A . StarB . MeshC . BusD . RingView AnswerAnswer: D

January 28, 2018 No Comments READ MORE +

Which of the following tools would be MOST appropriate for this scenario?

A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario?A . CrimperB . OTDRC . Throughput testerD . Punch down toolView AnswerAnswer: D

January 28, 2018 No Comments READ MORE +

Which of the following uses types and codes rather than ports?

Which of the following uses types and codes rather than ports?A . EIGRPB . ICMPC . UDPD . IPv6View AnswerAnswer: B

January 26, 2018 No Comments READ MORE +

Which of the following devices should a network administrator configure on the outermost part of the network?

Which of the following devices should a network administrator configure on the outermost part of the network?A . Media converterB . SwitchC . ModemD . FirewallView AnswerAnswer: D

January 25, 2018 No Comments READ MORE +

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?A . 20B . 21C . 23D . 25View AnswerAnswer: D

January 25, 2018 No Comments READ MORE +

Which of the following BEST describes what the network designer was referring to?

A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?A . Bad connectorsB . Cross-talkC...

January 24, 2018 No Comments READ MORE +

When using high bandwidth applications over multiple WAN connections, which of the following should be used?

When using high bandwidth applications over multiple WAN connections, which of the following should be used?A . Static IP addressingB . Half-duplexC . PoE devicesD . Load balancingView AnswerAnswer: D

January 24, 2018 No Comments READ MORE +

Which of the following provides the ability to deploy consistent access point configurations from a central location?

Which of the following provides the ability to deploy consistent access point configurations from a central location?A . Wireless controllerB . AAA serverC . WiFi-protected setupD . Proxy serverE . VPN concentratorView AnswerAnswer: A

January 23, 2018 No Comments READ MORE +

Which of the following technologies allows for redundant links within a Layer 2 segment?

Which of the following technologies allows for redundant links within a Layer 2 segment?A . OSPFB . RIPC . Port MirroringD . Spanning TreeView AnswerAnswer: D

January 21, 2018 No Comments READ MORE +