Which of the following should the technician enable?
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?
Which of the following devices will help prevent a lapt…
Which of the following devices will help prevent a laptop from being removed from a certain location?
which of the following would be used to satisfy the req…
When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?
Which of the following security mechanism would be MOST…
Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s financial records. Which of the following security
mechanism would be MOST appropriate to confirm Joe’s suspicion?
Which of the following communication technologies would…
Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple
signals at different wavelengths?
Which of the following MOST interferes with network-bas…
Which of the following MOST interferes with network-based detection techniques?
Which of the following is MOST likely the source of the…
A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the
VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem?
Which of the following is an important step in the init…
Which of the following is an important step in the initial stages of deploying a host-based firewall?
Which of the following must the technician configure on…
A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the
room through which the laptops will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order
to create this setup?
Which of the following BEST describes this implementation?
Each server on a subnet is configured to only allow SSH access from the administrator’s workstation. Which of the following BEST describes this implementation?