Which of the following is the BEST way to configure the…
A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients
should not have visibility to one another but should have visibility to the wired users. Users must seamlessly
migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the
BEST way to configure the new wireless network in the new building?
Which of the following should the technician use to ver…
While monitoring the network, a technician notices that the network traffic to one of the servers is extremely
high. Which of the following should the technician use to verify if this is a concern?
Which of the following servers should the technician im…
A technician needs to install a server to authenticate remote users before they have access to corporate
network resources when working from home. Which of the following servers should the technician implement?
which of the following?
A network topology in which all nodes have point to point connections to all other nodes is known as which of
the following?
which of the following?
A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an
example of which of the following?
Which of the following BEST describes the process of do…
Which of the following BEST describes the process of documenting everyone who has physical access or
possession of evidence
Which of the following would BEST meet these goals?
A facility would like to verify each individual’s identity prior to allowing access to the datacenter. Additionally,thefacility would like to ensure that users do not tailgate behind other users. Which of the following would BEST
meet these goals?
Which of the following is the BEST way to mitigate this…
A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on
the company network and is accessible from the internet. The security concern is that the FTP server iscompromised it may be used as a platform to attack other company servers. Which of the following is the BEST
way to mitigate this risk?
Which of the following should be done to prevent this i…
A company utilizes a patching server to regularly update their PC’s. After the latest round of patching all of the
older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician
to fix the issue locally at each PC. Which of the following should be done to prevent this issue in the future?
which of the following locations would the NAC service …
A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC
service place the laptop?