Which of the following standards requires the use of 5 …
A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires
the use of 5 GHz band wireless transmissions? (Select TWO)
Which of the following is the MOST likely cause?
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The
technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the
following is the MOST likely cause?
which of the following should the technician perform to…
A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with
full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking
devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network?
Which of the following features on the switch should th…
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the
NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use?
Which of the following technologies would be able to de…
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block
this traffic?
Which of the following cloud infrastructure designs inc…
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for
review?
which of the following attacks?
A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to
access the network. This describes which of the following attacks?
Which of the following would the technician use to view…
A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the
website and find the user browsing it?
which of the following network segments?
A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All
routers and switches should be configured to accept SSH connections from which of the following network segments?
Which of the following would be the BEST addition to a …
Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or
earthquake?