Which of the following would work BEST to achieve these…
A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to
a central point. Which of the following would work BEST to achieve these results?
Which of the following is a UC application?
Which of the following is a UC application?
Which of the following communication technologies is us…
Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central
location to subscribed devices?
Which of the following would need to be added to the ne…
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the
tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to
allow it to interpret the new device and control it using SNMP?
Which of the following integrity security mechanisms en…
Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?
which of the following network devices should a network…
A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC’s that do not have wireless
capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the
following network devices should a network technician use to connect all the devices to the wireless network?
Which of the following would be the BEST example of two…
A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be
the BEST example of two-factor authentication?
Which of the following default ports is associated with…
Which of the following default ports is associated with protocols that are connectionless?
which of the following?
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the
number of WAPs needed, it is important to reference which of the following?
Which of the following needs to be rolled back?
Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates
were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back?