Which of the following is the BEST reason why satellite connectivity for VoIP applications should not be used?
Which of the following is the BEST reason why satellite connectivity for VoIP applications should not be used?
Which of the following should the user do to help with signal strength?
A user is getting very weak signals while trying to connect to wireless. Which of the following should the user do to help with signal strength?
Which of the following monitoring techniques would BEST be used?
An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used?
Which of the following would MOST likely resolve the users connection issues?
An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users connection issues?
Which of the following WAN technologies uses labels to make forwarding decisions?
Which of the following WAN technologies uses labels to make forwarding decisions?
Which of the following uses eight groups of characters for addressing?
Which of the following uses eight groups of characters for addressing?
Which of the following is an example of two-factor authentication?
Which of the following is an example of two-factor authentication?
Which of the following would be the BEST solution?
While troubleshooting DHCP configurations, a technician notices that the address pool is full of active leases although the workstations may not even be on the network. Which of the following would be the BEST solution?
Which of the following attacks may be in progress?
A user reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?
Which of the following encryption types is an administrator MOST likely to enable on a public WAP in order to
Which of the following encryption types is an administrator MOST likely to enable on a public WAP in order to provide better security?