Which of the following are authentication methods that can use AAA authentication?
Which of the following are authentication methods that can use AAA authentication? (Select
TWO).
Which of the following is considered the demarc?
A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which
of the following is considered the demarc?
Which of the following are considered AAA authentication methods?
Which of the following are considered AAA authentication methods? (Select TWO).
Which of the following should be used to test the theory?
An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on
this device. The technician suspects a possible power issue. Which of the following should be
used to test the theory?
Which of the following would allow the technician to view network traffic on a switch?
A technician is troubleshooting a network issue and needs to view network traffic on a switch in
real-time. Which of the following would allow the technician to view network traffic on a switch?
which of the following OSI layers is the problem occurring?
A technician finds that the network card is no longer functioning. At which of the following OSI
layers is the problem occurring?
which of the following?
The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the
following?
Which of the following topologies is represented in this design?
An administrator has added four switches to a campus network. The switch in wiring closet A is
only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the
switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected
to the switch in wiring closet B. Which of the following topologies is represented in this design?
Which of the following can the administrator use to point out the phone system vulnerability?
A company wants an administrator to perform a vulnerability test. The administrator finds the
company has a POTS phone system. Which of the following can the administrator use to point out
the phone system vulnerability?
Which of the following is used to explain guidelines for users while using network resources?
Which of the following is used to explain guidelines for users while using network resources?