Which of the following should be enabled on the new network switch?
A company has just installed a new network switch for an expanding department. The company is
also piloting the use of a VoIP phone system for this department. Which of the following should be
enabled on the new network switch?
Which of the following devices requires 12V of power from the power supply?
Which of the following devices requires 12V of power from the power supply?
Which of the following protocol would be MOST appropriate?
A security engineer, Joe, has been asked to create a secure connection between his mail
server and the mail server of a business partner. Which of the following protocol would be
MOST appropriate?
Which of the following occurs during a project kick-off meeting?
Which of the following occurs during a project kick-off meeting? (Select Two).
Which of the following should be completed?
A system administrator currently has two web server VMs on one host. Users are reporting that
query searches within the site are slow. The system administrator notices that the host CPU is above
the threshold. Which of the following should be completed?
Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to oth
Which of the following Control Panel items will allow for easy streaming of pictures, music, and
videos to other Windows 7 PCs?
Which of the following network protocols is used for a secure command line interface for management of network
Which of the following network protocols is used for a secure command line interface for
management of network devices?
Which of the following is the MOST likely issue?
A user has replaced the media in a direct thermal printer with a new type of label. The user reports
that when the labels are fed through the printer, nothing is printed on the label. Which of the
following is the MOST likely issue?
Which of the following tools can provide the verification?
Users have reported issues accessing an Internet website. The network technician wants to verify
network layer connectivity. Which of the following tools can provide the verification?
Which of the following would be the BEST way to manage folder security?
A new network administrator is setting up a new file server for the company. Which of the
following would be the BEST way to manage folder security?