Which of the following is MOST likely misconfigured?
A network technician is replacing security devices that protect the DMZ for a client. The client has an
application that allows external users to access the application remotely. After replacing the devices, the
external users are unable to connect remotely to the application. Which of the following is MOST likely
misconfigured?
Which of the following is a UC application?
Which of the following is a UC application?
Which of the following would need to be added to the ne…
A technician installs a new piece of hardware and now needs to add the device to the network management
tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot
successfully interpret the results. Which of the following would need to be added to the network management
tool to allow it to interpret the new device and control it using SNMP?
Which of the following integrity security mechanisms en…
Which of the following integrity security mechanisms ensures that a sent message has been received intact, by
the intended receiver?
which of the following network devices should a network…
A company that was previously running on a wired network is performing office-wide upgrades. A department
with older desktop PC’s that do not have wireless capabilities must be migrated to the new network, ensuring
that all computers are operating on a single network. Assuming CAT5e cables are available, which of the
following network devices should a network technician use to connect all the devices to the wireless network?
Which of the following default ports is associated with…
Which of the following default ports is associated with protocols that are connectionless?
which of the following?
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless
network. Before the engineer can estimate the number of WAPs needed, it is important to reference which of
the following?
Which of the following features on the switch should th…
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to
be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which
of the following features on the switch should the network administrator use?
which of the followingattacks?
A network administrator receives a call asking for assistance with connecting to the network. The user asks for
the IP address, subnet class, and VLAN required to access the network. This describes which of the followingattacks?
Which of the following troubleshooting steps should the…
A network technician discovers an issue with spanning tree on the core switch. Which of the following
troubleshooting steps should the network technician perform NEXT to resolve the issue?