Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?A . NDAB . IRPC . BYODD . SLAView AnswerAnswer: C
which of the following is the BEST way for the company to connect these networks?
In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company b uses the following scheme: Subnet 1: 192.168.1.50/28 The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the...
Which of the following types of rules is the administrator implementing?
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?A . NATB . PATC . STPD . SNATE . ARPView AnswerAnswer: B
Which of the following is a vulnerable system designed to detect and log unauthorized access?
Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B
Which of the following should the technician do FIRST to reconnect the server to the network?
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the...
Without the use of auto-sensing ports, which of the following cables should be used?
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?A . Straight-throughB . ConsoleC . RolloverD . CrossoverView AnswerAnswer: D
Which of the following is MOST likely the cause?
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is...
To verify the configuration of the router, which of the following tools should the technician use?
A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?A . Loopback adapterB . Cable testerC . Tone generatorD ....
Where should you look to find out which applications are consuming the maximum number of resources?
Your computer is running slower than usual. Where should you look to find out which applications are consuming the maximum number of resources?A . Administrative ToolsB . Device ManagerC . System TrayD . Task ManagerE . Network and Sharing CenterView AnswerAnswer: D
Which of the following should be leveraged to complete this task?
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC...