Which of the following authentication services is being…
A system administrator is configuring UNIX accounts to authenticate against an external server. The configuration file asks for the following information
DC=ServerName and DC=COM. Which of the following authentication services is being used?
which of the following?
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is
usually called which of the following?
Which of the following was based on a previous X.500 sp…
Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of
TLS?
Which of the following should the technician check to e…
A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to
establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in
perfect condition. Which of the following should the technician check to ensure the new host will connect?
Which of the following authentication services would th…
An information bank has been established to store contacts, phone numbers and other records.
An application running on UNIX would like to connect to this index server using port 88. Which of the following authentication services would this use this port by
default?
Which of the following is the MINIMUM configuration tha…
A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet
this need?
Which of the following authentication services uses a t…
Which of the following authentication services uses a ticket granting system to provide access?
Which of the following would be the appropriate wireles…
A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video
streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?
Which of the following types of authentication solution…
Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?
Which of the following standards is implemented on the …
A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following
standards is implemented on the network?