Which of the following standards is the BEST option to fit the requirements?
A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?A . GSMB . TDMC . CDMAD...
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?A . DSLB . POTSC . T1D . DOCSISView AnswerAnswer: C
Which of the following security mechanisms has the technician enforced?
A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?A . DLPB . IDSC . WAFD . WPAE . TPMView AnswerAnswer: C
Which of the following should the technician perform to ensure another cannot be placed on the network?
A network technician has discovered a rogue access point placed under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?A . Disable unused ports on switchesB . Enable DHCP guard to detect rogue serversC . Configure WPA2 on...
Which of the following will allow the request to be fulfilled without breaking the corporate policy?
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?A . DHCP relayB . DHCP exclusionC...
Which of the following should the IT staff reference to determine the location of the equipment being moved?
A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved?A ....
Which of the following should the technician update to allow this functionality?
A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?A . Device softwareB ....
Which of the following is the address of the customer’s router?
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?A . 192.168.0.55B . 192.168.1.0C . 192.168.1.1D . 192.168.5.5E . 255.255.255.0View AnswerAnswer: C
Which of the following protocols do MOST MITM attacks utilize?
Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A
Which of the following would allow SSH to function properly?
A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?A . Perform file hashingB . Generate...