Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but st
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but
still allow already connected users to continue to connect?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following tools can provide the verification?
Users have reported issues accessing an Internet website. The network technician wants to verify network
layer connectivity. Which of the following tools can provide the verification?
Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large
amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the
user’s PC?
Which of the following protocols needs to be denied?
A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a
rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of
the following protocols needs to be denied?
Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that
they are unable to access Internet websites. The technician verifies this using the IP address of a popular
website. Which of the following is the MOST likely cause of the error?
Whichof the following identifies the location?
The ISP needs to terminate the WAN connection. The connection should be located in the network server
room where the company LAN equipment resides. Whichof the following identifies the location?
Which of the following is the BEST way to mitigate such an equipment failure?
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department
would like a way to prevent such an incident in thefuture. Which of the following is the BEST way to mitigate
such an equipment failure?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing t
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their
methods, and preventing real attacks on the production network?
Which of the following is the FASTEST Ethernet technology?
Which of the following is the FASTEST Ethernet technology?