Which of the following network devices restricts traffic based on words, signatures, and URLs?
Which of the following network devices restricts traffic based on words, signatures, and URLs?
Which of the following interfaces on the router will be modified?
Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following
interfaces on the router will be modified?
Which of the following items is MOST likely missing in the configuration?
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is
working properly but cannot be accessed remotely. Which of the following items is MOST likely
missing in the configuration?
Which of the following resources can be used to verify this problem?
Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the
following resources can be used to verify this problem?
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to in
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in
order to increase usable bandwidth?
Which of the following is the MOST likely cause?
Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which
of the following is the MOST likely cause?
Which of the following configurations should Jeff consider for these requirements?
Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the
following configurations should Jeff consider for these requirements? (Select TWO).
Which of the following is MOST likely the cause?
Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the
cause?
Which of the following protocols will support secure transmission of the data?
Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It
is important the information be sent securely to the monitoring station. Which of the following
protocols will support secure transmission of the data?
Kim, a technician, should immediately check the:
A Windows server has a problem after booting up. Kim, a technician, should immediately check the: