Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?A . 2.4GHzB . 5GHzC . 6GHzD . 900MHzView...

December 13, 2023 No Comments READ MORE +

Which of the following ports is commonly used by VoIP phones?

Which of the following ports is commonly used by VoIP phones?A . 20B . 143C . 445D . 5060View AnswerAnswer: D Explanation: TCP/UDP port 5060 is commonly used by VoIP phones. It is the default port for SIP (Session Initiation Protocol), which is a signaling protocol that establishes, modifies, and...

December 12, 2023 No Comments READ MORE +

Which of the following describes the issue?

A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...

December 12, 2023 No Comments READ MORE +

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?A . Fault toleranceB . Quality of serviceC . Load balancingD . Port aggregationView AnswerAnswer: C Explanation: Load balancing is a technology that allows traffic to be sent through two different ISPs to increase...

December 12, 2023 No Comments READ MORE +

Which of the following technologies provides a failover mechanism for the default gateway?

Which of the following technologies provides a failover mechanism for the default gateway?A . FHRPB . LACPC . OSPFD . STPView AnswerAnswer: A Explanation: First Hop Redundancy Protocol (FHRP) provides a failover mechanism for the default gateway, allowing a backup gateway to take over if the primary gateway fails. Reference:...

December 12, 2023 No Comments READ MORE +

Which of the following metrics will MOST accurately show the underlying performance issues?

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usageB ....

December 12, 2023 No Comments READ MORE +

Which of the following is used to track and document various types of known vulnerabilities?

Which of the following is used to track and document various types of known vulnerabilities?A . CVEB . Penetration testingC . Zero-dayD . SIEME . Least privilegeView AnswerAnswer: A Explanation: CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to...

December 12, 2023 No Comments READ MORE +

Which of the following is MOST likely the cause of the desktop not connecting?

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on...

December 11, 2023 No Comments READ MORE +

Which of the following should the technician review on the switch to locate the device’s network port?

A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route tableB . VLAN tagC . MAC tableD . QoS tagView...

December 11, 2023 No Comments READ MORE +

Which of the following attack types BEST describes this action?

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attackB . Rainbow table attackC . Brute-force attackD . Dictionary attackView AnswerAnswer: D Explanation: The...

December 11, 2023 No Comments READ MORE +