Which of the following policies should be followed?
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?A . Change management policyB . Remote access policyC . Acceptable use policyD . Memorandum of understandingView AnswerAnswer: A
Which of the following should the technician use to reveal the location of the fault?
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the...
Which of the following is used to classify network data for the purpose of providing QoS?
Which of the following is used to classify network data for the purpose of providing QoS?A . STPB . VLANsC . SIPD . DSCPView AnswerAnswer: D
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?A . Time division multiplexingB . Analog circuit switchingC . CSMA/CDD . Time division spread spectrumView AnswerAnswer: A
Which of the following should the CIO complete?
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of...
Which of the following is MOST likely the cause?
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is...
Which of the following should the technician perform to ensure another cannot be placed on the network?
A network technician has discovered a rogue access point placed under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?A . Disable unused ports on switchesB . Enable DHCP guard to detect rogue serversC . Configure WPA2 on...
Which of the following will allow the request to be fulfilled without breaking the corporate policy?
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?A . DHCP relayB . DHCP exclusionC...
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?A . STPB . RTPC . RIPD . NTPE . SIPView AnswerAnswer: C
Which of the following should be leveraged to complete this task?
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC...