Which of the following is an example of a DHCP failover mechanism?
Which of the following is an example of a DHCP failover mechanism?
Which of the following should be configured on the switch to utilize the IDS?
Jeff, a technician, is setting up an IDS security device. Which of the following should be configured on
the switch to utilize the IDS?
Which of the following should be configured to resolve this problem?
Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted
wireless network has been getting slower while his Internet traffic has steadily been increasing.
Which of the following should be configured to resolve this problem?
Which of the following would BEST allow this and have the ability for the server to keep the same IP address?
Lisa, a network technician, would like to keep the IP address of the Human Resource department’s
server in the same group of 100 DHCP IP addresses that are assigned to the Human Resource
department’s employee workstations. Which of the following would BEST allow this and have the
ability for the server to keep the same IP address?
Which of the following could be used to limit the access to the wireless network?
Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless
access points seems high compared to the limited number of wireless devices used. Jeff believes that
other non-employees are using the wireless network to access the Internet. Which of the following
could be used to limit the access to the wireless network? (Select TWO).
Which of the following cable types should a technician use for this computer?
Zach, a customer, wants to network several computers within a large warehouse. The warehouse
has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the
network switch. Which of the following cable types should a technician use for this computer?
Which of the following should be configured on Kim’s wireless network to differentiate it from other wireles
Kim, a customer, wants to install a wireless network into a shared office space. There are several
other wireless networks from other companies that can be detected within the office space. Which
of the following should be configured on Kim’s wireless network to differentiate it from other
wireless networks and still provide the BEST performance and security? (Select TWO).
which of the following configurations MUST be present?
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both
switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber
cable, which of the following configurations MUST be present?
Which of the following is the MOST likely cause of the problem?
Zach, a user, on a network cannot access any network resources. The link light on his computer
shows that a connection is present. Which of the following is the MOST likely cause of the problem?
Which of the following configuration changes would facilitate access?
Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port. Which
of the following configuration changes would facilitate access?