Which of the following represents the MOST secure method to configure guest access to the wireless network?

A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?A . Guests should log into a separate wireless...

March 17, 2020 No Comments READ MORE +

Which of the following would BEST assist in recovering these devices?

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?A . Asset tracking tagsB . Motion detectorsC . Security guardsD . Computer locksView AnswerAnswer: D

March 17, 2020 No Comments READ MORE +

Which of the following solution sets properly addresses all of the identified requirements?

An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following: - WLAN architecture supporting speeds in excess of 150 Mbps - Clientless remote network access - Port-based network access control Which of the following solution sets properly addresses all...

March 17, 2020 No Comments READ MORE +

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A

March 17, 2020 No Comments READ MORE +

Which of the following protocols is the technician MOST likely to consider?

A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)A . SIPB . NTPD . 323E . SMBF . ICMPG . RTPH . IPSec . RDPView AnswerAnswer: ACF

March 16, 2020 No Comments READ MORE +

Which of the following devices should a network administrator configure on the outermost part of the network?

Which of the following devices should a network administrator configure on the outermost part of the network?A . Media converterB . SwitchC . ModemD . FirewallView AnswerAnswer: D

March 16, 2020 No Comments READ MORE +

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A

March 16, 2020 No Comments READ MORE +

Which of the following is the correct port number for NTP?

Which of the following is the correct port number for NTP?A . 25B . 69C . 123D . 161View AnswerAnswer: C

March 16, 2020 No Comments READ MORE +

A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?

A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?A . Time division multiplexingB . Analog circuit switchingC . CSMA/CDD . Time division spread spectrumView AnswerAnswer: A

March 15, 2020 No Comments READ MORE +

Which of the following represents the BEST configuration for the remote site?

A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network...

March 15, 2020 No Comments READ MORE +