Which of the following ports is commonly used by VoIP phones?
Which of the following ports is commonly used by VoIP phones?A . 20B . 143C . 445D . 5060View AnswerAnswer: D Explanation: TCP/UDP port 5060 is commonly used by VoIP phones. It is the default port for SIP (Session Initiation Protocol), which is a signaling protocol that establishes, modifies, and...
Which of the following will the company MOST likely configure to improve performance for these applications?
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications?A . Link Aggregation Control ProtocolB . Dynamic routingC . Quality of serviceD . Network load balancerE . Static IP addressesView AnswerAnswer: C Explanation: To improve performance for...
Which of the following would MOST likely be used to review previous upgrades to a system?
Which of the following would MOST likely be used to review previous upgrades to a system?A . Business continuity planB . Change managementC . System life cycleD . Standard operating proceduresView AnswerAnswer: B Explanation: Change management is the process of reviewing previous upgrades to a system. It is a systematic...
Which of the following should the systems administrator select to meet this requirement?
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?A . 802.11acB . 802.11axC ....
Which of the following should a network administrator configure to BEST prevent unauthorized access?
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...
Which of the following routing protocols is used to exchange route information between public autonomous systems?
Which of the following routing protocols is used to exchange route information between public autonomous systems?A . OSPFB . BGPC . EGRIPD . RIPView AnswerAnswer: B Explanation: BGP (Border Gateway Protocol) is a routing protocol used to exchange route information between public autonomous systems (AS). OSPF (Open Shortest Path First),...
Which of the following BEST describes this deployment?
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?A . Extended service setB . Basic service setC . Unified service setD...
Which of the following connector types would have the MOST flexibility?
Which of the following connector types would have the MOST flexibility?A . SFPB . BNCC . LCD . RJ45View AnswerAnswer: A Explanation: SFP (Small Form-factor Pluggable) is a connector type that has the most flexibility. It is a hot-swappable transceiver that can support different speeds, distances, and media types depending...
Which of the following policies should the network administrator implements to BEST mitigate this issue?
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portalB . Two-factor authenticationC . Complex passwordsD . GeofencingE . Role-based accessF . Explicit denyView...
You have been tasked with setting up a wireless network in an office
SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless signals should...