Which of the following should be implemented?
A security administrator wants to deploy a physical security control to limit an individual’s access
into a sensitive area. Which of the following should be implemented?
which of the following channels are the BEST for multiple mobile channel access deployment?
Given a WiFi deployment using the 2.4GHz band, which of the following channels are the BEST
for multiple mobile channel access deployment?
Which of the following layers of the OSI model is above the Session layer?
Which of the following layers of the OSI model is above the Session layer?
Which of the following devices allows multiple internal IP addresses to access an external website with minima
Which of the following devices allows multiple internal IP addresses to access an external
website with minimal impact to the network bandwidth?
802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of the following?
802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of
the following?
Which of the following needs to be considered when using this cable?
An administrator is installing a new cable plant in a datacenter. The administrator plans on using
50 micron multi-mode cabling that is in stock. Which of the following needs to be considered when
using this cable?
Which of the following types of SATA hard disk drives is used for the Desktop computers?
Which of the following types of SATA hard disk drives is used for the Desktop computers?
which of the following?
A network administrator uses an RFID card to enter the datacenter, a key to open the server rack,
and a username and password to logon to a server. These are examples of which of the
following?
which of the following access point types is BEST to use?
Given an enterprise WLAN deployment, which of the following access point types is BEST to use?
which of the following authentication services?
A third party application has the ability to maintain its own user accounts or it may use single signon. To use single sign-on, the application is requesting the following information: OU=Users,
DC=Domain, DC=COM. This application is requesting which of the following authentication
services?
