Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue?A . Increase installed...
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?A . Multifactor authenticationB . ISAKMPC . TACACS+D . Network access control View Answer Answer: C Explanation: TACACS+ (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) services....
Which of the following should the technician do NEXT in the troubleshooting methodology?
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and action taken.B . Establish...
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).A . RS-232B . 56k modemC . BluetoothD . CodecE . SIP View Answer Answer: D,E Explanation: The term "codec" is a concatenation of "encoder" and "decoder”. In video conferencing, a codec is software (or can be hardware) that compresses...
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?A . 66 blockB . BNCC . F-connectorD . RJ-11 View Answer Answer: B Explanation: A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial...
Which of the following utilities will identify if the workstation uses DHCP?
An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP?A . tracertB . pingC . digD . ipconfigE . netstat View Answer Answer: D Explanation: The ipconfig command displays the TCP/IP configuration of a Windows system. The ipconfig /all command displays the...
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following is a security benefit gained from setting up a guest wireless network?A . Optimized device bandwidthB . Isolatedcorporate resourcesC . Smaller ACL changesD . Reduced password resets View Answer Answer: B Explanation: A wireless guest network could be set up so that it has limited access (no access to local...
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).A . OSPFB . VTP trunkingC . Virtual PBXD . RADIUSE . 802.1x View Answer Answer: D,E Explanation: D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user accounts and passwords used as...
A VLAN with a gateway offers no security without the addition of:
A VLAN with a gateway offers no security without the addition of:A . An ACC . 802.1w.D . A RADIUS server.E . 802.1d. View Answer Answer: A Explanation: A gateway in a VLAN connects to another network. The other network can be the Internet, another subnet on the network or another VLAN. The gateway...
Network segmentation provides which of the following benefits?
Network segmentation provides which of the following benefits?A . Security through isolationB . Link aggregationC . Packet flooding through all portsD . High availability through redundancy View Answer Answer: A Explanation: Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment. Advantages...