Which of the following is a document that is used in cy…
Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?
Which of the following will MOST likely be an issue wit…
A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an
ST 80/125. Which of the following will MOST likely be an issue with the new cable?
which of the following is the BEST course of action for…
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate.
The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following
is the BEST course of action for the network administrator to take?
Which of the following is MOST likely the cause?
A technician add memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the
memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is MOST likely the cause?
Which of the following is MOST likely the cause?
A client is receiving certificate errors in other languages when trying to access the company’s main intranet site. Which of the following is MOST likely the cause?
Which of the following is the MOST likely cause?
A network administrator notices that the border router is having high network capacity loads during non-working hours which is causing web services outages.
Which of the following is the MOST likely cause?
Which of the following 802.11g antennas broadcast an RF…
Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a narrow path?
Which of the following should the technician do to prot…
A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following
should the technician do to protect the network from ping sweeps?
Which of the following can the technician deploy to cor…
A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the
equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue?
Which of the following is MOST likely misconfigured?
A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application
remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?