Which of the following standards is the BEST option to fit the requirements?
A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?A . GSMB . TDMC . CDMAD...
Which three actions should you perform in sequence?
DRAG DROP You have an intelligent edge solution that processes data and outputs the data to an Azure Cosmos DB account that uses the SQL API. You need to ensure that you can perform full text searches of the data. Which three actions should you perform in sequence? To answer,...
Which of the following protocols is the technician MOST likely to consider?
A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)A . SIPB . NTPD . 323E . SMBF . ICMPG . RTPH . IPSec . RDPView AnswerAnswer: A,C,F
According to the OSI model, at which of the following layers is data encapsulated into a packet?
According to the OSI model, at which of the following layers is data encapsulated into a packet?A . Layer 2B . Layer 3C . Layer 4D . Layer 5E . Layer 6View AnswerAnswer: B
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?A . 10.8.0.0/16B . 10.8.0.0/19C . 10.8.0.0/20D . 10.0.0.0/24View AnswerAnswer: A
Which of the following should be added to allow the clients to connect?
Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?A . DHCP lease timeB . IP helperC . TTLD . DNS record typeView AnswerAnswer: B
Which of the following tasks should be done FIRST?
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)A . Network scanB . Banner grabC . TracertD . DHCP server checkE . Brute-force attackView AnswerAnswer: A,C
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?A . STPB . RTPC . RIPD . NTPE . SIPView AnswerAnswer: C
Which of the following is a Layer 2 access control the technician should implement?
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?A . Access control listsB . Captive portalC . WPA2D . Port securityView AnswerAnswer: D
Which of the following steps would MOST likely correct this issue?
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not...