Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?A . NDAB . IRPC . BYODD . SLAView AnswerAnswer: C
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:A . penetration testingB . vulnerability scanningC . reconnaissanceD . social engineeringView AnswerAnswer: A
Which of the following is MOST likely the cause?
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is...
Which of the following devices needs to be installed between the switches to allow communication?
A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?A . BridgeB . Access pointC ....
Which of the following should the network administrator do to rule out any problems at Layer 1?
A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following...
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?A . 10.8.0.0/16B . 10.8.0.0/19C . 10.8.0.0/20D . 10.0.0.0/24View AnswerAnswer: A
Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?
A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?A . 23B . 25C . 110D . 143View AnswerAnswer: B
Which of the following network topologies do these represent?
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)A . Point-to-multipointB . BusC . Point-to-pointD . MeshE . Peer-peerF . RingView AnswerAnswer: CD
Which of the following solution sets properly addresses all of the identified requirements?
An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following: - WLAN architecture supporting speeds in excess of 150 Mbps - Clientless remote network access - Port-based network access control Which of the following solution sets properly addresses all...
Which of the following should be changed on the network?
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the...