Which of the following should the technician update to allow this functionality?
A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?A . Device softwareB ....
Which of the following network topologies do these represent?
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)A . Point-to-multipointB . BusC . Point-to-pointD . MeshE . Peer-peerF . RingView AnswerAnswer: CD
Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?
Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A
Which of the following should the network team implement to fulfil the request?
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?A . Proxy serverB . UTM applianceC . Content filterD...
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
Which of the following MUST be implemented to share metrics between routing protocols within the same router?A . Routing loopB . Routing tableC . Route redistributionD . Dynamic routesView AnswerAnswer: B Â
Which of the following should the technician perform to discover possible interference?
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?A . Site surveyB . Vulnerability scanningC . WardrivingD . Checking logical diagramE . Bandwidth testView AnswerAnswer:...
Which of the following should the technician install to BEST meet the goal?
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router...
Which of the following steps should the network technician take NEXT?
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?A . Test the possible solutionB . QUESTION NO: the usersC . Determine what has changedD . Document the theoryView AnswerAnswer: A
Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?
A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?A...
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?A . Guests should log into a separate wireless...