Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have
reported that they are unable to access Internet websites. The technician verifies this using the IP
address of a popular website. Which of the following is the MOST likely cause of the error?
which of the following bus speeds will the system function?
A technician has just installed two memory modules on a motherboard that supports DDR3 RAM
with the bus speed up to 1600 MHz. The specifications of memory are DDR3 1066 MHz for one
module and DDR3 1333 MHz for another. On which of the following bus speeds will the system
function?
Which of the following should a technician configure on a small office home office (SOHO) wireless router so I
Which of the following should a technician configure on a small office home office (SOHO) wireless
router so IP addresses are automatically assigned to devices on the wireless network?
Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connecti
Which of the following source ports is MOST likely to be used by a client when making an
outbound TCP connection to a windows server?
This is BEST described as:
A project manager sits down to discuss with team members the strengths and weaknesses of a
project. This is BEST described as:
Which of the following would the security team ask Joe to provide during the security review?
Joe, a network administrator, is working with the security team to determine who deleted files from
a file share. Which of the following would the security team ask Joe to provide during the security
review?
Which of the following is the MOST likely cause?
A technician notices a computer is overheating after 30 minutes of use. Which of the following is the
MOST likely cause?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing t
Which of the following describes a single computer that is setup specifically to lure hackers into
revealing their methods, and preventing real attacks on the production network?
Which of the following ports on the firewall should be checked?
A customer states that since the new firewall has been installed, the customer has not been able to
send email. Which of the following ports on the firewall should be checked?
This is an example of:
A project is approved in a series of stages. This is an example of: