what the technician is using?
A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-
45 plug. Which of the following describes what the technician is using?
Which of the following cable types is LEAST affected in areas of high EMI?
Which of the following cable types is LEAST affected in areas of high EMI?
which of the following?
A network technician is troubleshooting signal problems with certain WAPs in an office and finds
consistently high ping times across the units. Such an issue is called which of the following?
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mo
Which of the following controls can be implemented together to prevent data loss in the
event of theft of a mobile device storing sensitive information? (Select TWO).
Which of the following are created using information contained in the work breakdown structure (WBS)?
Which of the following are created using information contained in the work breakdown structure
(WBS)? (Select Two).
Which of the following should be installed on VMs to report and take action against potential threats?
Which of the following should be installed on VMs to report and take action against potential
threats?
Which of the following data types can be synchronized to a mobile device by default?
Which of the following data types can be synchronized to a mobile device by default? (Select TWO).
Which of the following network topologies is MOST likely used in remote access VPN?
Which of the following network topologies is MOST likely used in remote access VPN?
Which of the following would be the BEST approach to resolve Joe’s concerns?
Joe, an irate customer, calls the help desk and informs the technician that no one has fixed his
problem. The technician looks up the request in the system and finds that the issue is a warranty
claim for accidental damage that is not covered by the company. Which of the following would be
the BEST approach to resolve Joe’s concerns?
A way to assure data at-rest is secure even in the event of loss or theft is to usE.
A way to assure data at-rest is secure even in the event of loss or theft is to usE.