which of the following?
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the
number of WAPs needed, it is important to reference which of the following?
Which of the following account management techniques sh…
A security analyst implemented group-based privileges within the company active directory. Which of the following account management techniques should be
undertaken regularly to ensure least privilege principles?
Which of the following needs to be rolled back?
Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates
were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the accounting department. Part of their new duties will be to check the
daily balance sheet calculations on spreadsheets that are restricted to the accounting group. In which of the following ways should the account be handled?
Which of the following standards requires the use of 5 …
A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires
the use of 5 GHz band wireless transmissions? (Select TWO)
Which of the following practices reduces the management…
Which of the following practices reduces the management burden of access management?
Which of the following is the MOST likely cause?
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The
technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the
following is the MOST likely cause?
Which of the following security controls would be imple…
A system administrator needs to ensure that certain departments have more restrictive controls to their shared folders than other departments. Which of the
following security controls would be implemented to restrict those departments?
which of the following should the technician perform to…
A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with
full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking
devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network?
Which of the following methods should the system admini…
A new intern was assigned to the system engineering department, which consists of the system architect and system software developer’s teams. These two teams
have separate privileges. The intern requires privileges to view the system architectural drawings and comment on some software development projects. Which of
the following methods should the system administrator implement?