Which of the following would be the MOST helpful in reg…
A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to
replace it. Which of the following would be the MOST helpful in regaining connectivity?
Which of the following types of authentication is being…
A company requires that a user’s credentials include providing something they know and something they are in order to gain access to the network. Which of the
following types of authentication is being described?
which of the following OSI model layers?
QoS operates at which of the following OSI model layers? (Select TWO)
How many authentication factors are in use by the VPN s…
A company with a US-based sales force has requested that the VPN system be configured to authenticate the sales team based on their username, password and
a client side certificate. Additionally, the security administrator has restricted the VPN to only allow authentication from the US territory. How many authentication
factors are in use by the VPN system?
which of the following?
Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following?
Which of the following protocols provides for mutual au…
Which of the following protocols provides for mutual authentication of the client and server?
which of the following devices will the technician impl…
A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On
which of the following devices will the technician implement the loopback?
Which of the following is an example of multifactor aut…
Which of the following is an example of multifactor authentication?
Which of the following applies to data as it travels fr…
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
Which of the following should be implemented during the…
A technician wants to implement a dual factor authentication system that will enable the organization to authorize access to sensitive systems on a need-to-know
basis. Which of the following should be implemented during the authorization stage?