Which of the following security measures could he use to set up this functionality?
Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zachs own country. Which of the following security measures could he use to set up this functionality?
Which of the following hardware tools would a technician use to BEST connect cabling to a patch panel?
A technician needs to add an additional cable run. Which of the following hardware tools would a
technician use to BEST connect cabling to a patch panel?
Which of the following commands should Lisa use?
Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?
The BEST technique to accomplish this task will be:
An administrator wants to prevent traffic from a specific VLAN from reaching any internal
resources, but will be able to reach the Internet. The BEST technique to accomplish this task will
be:
Which of the following will accomplish this objective?
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
Which of the following would cause signal interference in a 2.4 GHz WAP?
Which of the following would cause signal interference in a 2.4 GHz WAP? (Select TWO).
Which of the following ports need to be enabled on the firewall?
Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
Which of the following tools should the network technician use to verify the cable?
The network technician needs to verify that a cable is in good condition and works properly. Which
of the following tools should the network technician use to verify the cable?
Which of the following would be the NEXT step in the troubleshooting process?
Lisa, a network technician, has determined that the initial theory of probable cause was incorrect.
Which of the following would be the NEXT step in the troubleshooting process?
Which of the following is an environment where only a username and password are required for successful authen
Which of the following is an environment where only a username and password are required for
successful authentication results in access to multiple resources?