which of the following OSI layers?
As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the following OSI layers? (Select TWO)
Which of the following is the MOST likely reason why th…
Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP address.
Which of the following is the MOST likely reason why the router is not receiving a DHCP address?
Which of the following protocols is considered a hybrid…
Which of the following protocols is considered a hybrid routing protocol?
Which of the following is the MOST common connector tha…
A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building.
Which of the following is the MOST common connector that will be used on the switch to connect the media converter?
Which of the following ACL should the technician configure?
A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network.
Which of the following ACL should the technician configure? (Select TWO)
Which of the following is the best option?
A technician is concerned about security and is asked to set up a network management protocol.
Which of the following is the best option?
which of the following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
which of the following technologies to prevent unauthor…
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IP Zone Dest IP Zone Port Action
Any Untrust Any DMZ 80 Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
Which of the following is the malicious student impleme…
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom.
Which of the following is the malicious student implementing?
which of the following network segmentation techniques?
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route packages.
This is an example of which of the following network segmentation techniques?