Which of the following would BEST assist in recovering these devices?

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?A . Asset tracking tagsB . Motion detectorsC . Security guardsD . Computer locksView AnswerAnswer: D

December 24, 2019 No Comments READ MORE +

Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?A . 23B . 25C . 110D . 143View AnswerAnswer: B

December 23, 2019 No Comments READ MORE +

Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?

A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?A . Use a modem to...

December 23, 2019 No Comments READ MORE +

Which of the following solutions is MOST likely to resolve the problem?

A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However,...

December 22, 2019 No Comments READ MORE +

Considering that the config files are the same, which of the following is the MOST likely cause of the failure?

A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely...

December 22, 2019 No Comments READ MORE +

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A

December 20, 2019 No Comments READ MORE +

When enabling jumbo frames on a network device, which of the following parameters is being adjusted?

When enabling jumbo frames on a network device, which of the following parameters is being adjusted?A . SpeedB . DuplexC . MTUD . TTLView AnswerAnswer: C

December 19, 2019 No Comments READ MORE +

Which of the following represents the BEST configuration for the remote site?

A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network...

December 18, 2019 No Comments READ MORE +

Which of the following should the technician perform to ensure another cannot be placed on the network?

A network technician has discovered a rogue access point under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?A . Disable unused ports on switchesB . Enable DHCP guard to detect rogue serversC . Configure WPA2 on all...

December 18, 2019 No Comments READ MORE +

Which of the following would allow SSH to function properly?

A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?A . Perform file hashingB . Generate...

December 18, 2019 No Comments READ MORE +