Which of the following networks would be the most appropriate for this application?
A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?A . 172.16.0.0/24B . 192.168.0.0/24C . 224.0.0.0/24D . 240.0.0.0/24View AnswerAnswer: C Explanation: Understanding Multicast: Multicast IP Address Range: The multicast address range is...
Which of the following steps should the architect take to troubleshoot the issue?
After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?A . Check to see if the end connections were wrapped in copper tape before terminating.B . Use passthrough...
Which of the following technologies will best meet this requirement?
An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?A . SD-WANB . VXLANC . VPND . NFVView AnswerAnswer: A Explanation: Definition of SD-WAN: Software-Defined Wide Area Network (SD-WAN)...
Which of the following should be configured so users can authenticate to a wireless network using company credentials?
Which of the following should be configured so users can authenticate to a wireless network using company credentials?A . SSOB . SAMLC . MFAD . RADIUSView AnswerAnswer: D Explanation: RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users...
Which of the following is most likely responsible for the security and handling of personal data in Europe?
Which of the following is most likely responsible for the security and handling of personal data in Europe?A . GDPRB . SCADAC . SAMLD . PCI DSSView AnswerAnswer: A Explanation: Definition of GDPR: General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for...
Which of the following troubleshooting steps should the electrician take first?
After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?A . Inspect the connectors for any wires that are touching or exposed.B . Restore default settings on...
Which of the following technologies would most likely mitigate this issue?
A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).A . Mesh networkB . 5GHz frequencyC . Omnidirectional antennaD . Non-overlapping channelE . Captive portalF . Ad hoc networkView AnswerAnswer: B Explanation: Understanding 2.4GHz Interference:...
Which of the following does a full-tunnel VPN provide?
Which of the following does a full-tunnel VPN provide?A . Lower bandwidth requirementsB . The ability to reset local computer passwordsC . Corporate Inspection of all network trafficD . Access to blocked sitesView AnswerAnswer: C Explanation: A full-tunnel VPN routes all of a user's network traffic through the corporate network....
Which of the following would fulfill this requirement?
A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?A . Jumbo framesB . 802.1Q taggingC . Native VLAND . Link aggregationView AnswerAnswer: B Explanation:
Which of the following is the most secure way to provide site-to-site connectivity?
Which of the following is the most secure way to provide site-to-site connectivity?A . VXLANB . IKEC . GRED . IPsecView AnswerAnswer: D Explanation: IPsec (Internet Protocol Security) is the most secure way to provide site-to-site connectivity. It provides robust security services, such as data integrity, authentication, and encryption, ensuring...