Which of the following would be used in an IP-based vid…
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
Which of the following network infrastructure implement…
Which of the following network infrastructure implementations would be used to support files being transferred
between Bluetooth-enabled smartphones?
Which of the following is used to authenticate remote w…
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
Which of the following tools can be used to locate its …
A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad
CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location
within the wall?
Which of the following communication technologies is us…
Which of the following communication technologies is used by video conferencing systems to synchronize
video streams, and reduce bandwidth, sent by a central location to subscribed devices?
Which of the following can the technician deploy to cor…
A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the
network equipment, the technician finds that all of the equipment is restarting at the same time every day.
Which of the following can the technician deploy to correct this issue?
Which of thefollowing tools should be used to discover …
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a
ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond. Which of thefollowing tools should be used to discover the cause of the poor performance?
Which of the following is MOST likely the cause?
A technician adds memory to a router, but that memory is never recognized by the router. The router is then
powered down and the technician reallocates all of the memory to different modules. On startup, the router
does not boot and displays memory errors. Which of the following is MOST likely the cause?
Which of the following standards requires the use of 5 …
A network administrator wants to deploy a wireless network in a location that has too much RF interference at
2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select
TWO)
Which of the following would be the BEST example of two…
A company is implementing enhanced user authentication for system administrators accessing the company’s
confidential servers. Which of the following would be the BEST example of two-factor authentication?