Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?A . 0B . 1C . 2D . 6E . 12View AnswerAnswer: B
Which of the following should the technician use to secure the connection?
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?A . SSH in tunnel modeB . RDP set to console connectionC . EAP-PEAPD ....
Which of the following tools should be used to BEST determine where the outage is occurring?
Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?A . tracerouteB . pingC...
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?A . DSLB . POTSC . T1D . DOCSISView AnswerAnswer: C
Which of the following steps should the network technician take NEXT?
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?A . Test the possible solutionB . Question the usersC . Determine what has changedD . Document the theoryView AnswerAnswer: A
Which of the following should current network performance be compared against to determine network anomalies?
Which of the following should current network performance be compared against to determine network anomalies?A . BaselineB . Traffic analysisC . Packet captureD . LogsView AnswerAnswer: A
Which of the following security mechanisms has the technician enforced?
A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?A . DLPB . IDSC . WAFD . WPAE . TPMView AnswerAnswer: C
Which of the following is the MOST likely reason?
A network administrator configures a router with the following IP address information: Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30 Clients are connected to a switch on the gigabit Ethernet interface; the ISP is connected to the Serial 0 interface. When the router configuration is complete and client devices...
Which of the following should the technician perform to discover possible interference?
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?A . Site surveyB . Vulnerability scanningC . WardrivingD . Checking logical diagramE . Bandwidth testView AnswerAnswer:...
Which of the following should the technician do to make a crossover cable before crimping the new plug?
A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off...