Which of the following would allow her to perform this activity?
Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?
Which of the following protocols is used to allow multiple hosts to share a common IP address?
Which of the following protocols is used to allow multiple hosts to share a common IP address?
Which of the following protocols uses port 3389?
Which of the following protocols uses port 3389?
which parameter will BEST limit access to the office area?
When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?
Which of the following should the technician enable?
Zach, a network technician, is installing a 48 port switch. Zach is configuring the switch to avoid switch looping. Which of the following should the technician enable?
Which of the following configurations should Joe consider for these requirements?
Joe, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of
the following configurations should Joe consider for these requirements? (Select TWO).
Which of the following should Zach perform FIRST before responding to the ticket?
Zach, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Zach perform FIRST before responding to the ticket?
Which of the following protocols requires MIBs?
A supervisor requests that a technician downloads a MIB for a particular server. Which of the
following protocols requires MIBs?
Which of the following is MOST likely the cause?
Jeff, a technician, is troubleshooting a PoE switch used for voice. Users report that their phones turn off and reboot often. Which of the following is MOST likely the cause?
Which of the following should the technician check?
A technician replaces a customers router, and is now unable to ping the ISPs gateway. Which of
the following should the technician check?