which parameter will BEST limit access to the office area?
When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?
Which of the following protocols requires MIBs?
A supervisor requests that a technician downloads a MIB for a particular server. Which of the
following protocols requires MIBs?
Which of the following should the technician check?
A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the
following should the technician check?
Which of the following is the MOST likely cause?
A new monitoring device is installed in the network that uses ping to determine whether critical
network Internet routers are up. After three missing pings, the alarm reports the device is down. The
device is now constantly reporting alarms, yet there are no reported Internet problems from users.
Which of the following is the MOST likely cause?
Which of the following is the MOST likely reason?
A network technician configures a firewall to block only certain IP addresses from accessing the
Internet. All users are reporting that they are unable to access the Internet. Which of the following is
the MOST likely reason?
Which of the following protocols is used for remote management of devices?
Which of the following protocols is used for remote management of devices?
which of the following authentication techniques?
A DSL modem connects to the provider’s network using which of the following authentication
techniques?
Which of the following tools should be used?
A technician needs to test the length of a newly installed cable run because it is believed that it
exceeds the maximum specification length. Which of the following tools should be used?
Which of the following would be the MOST secure way to harden this wireless network?
A customer has not been using security on a wireless network and has recently received many
attacks through this vector. Which of the following would be the MOST secure way to harden this
wireless network?
which of the following?
Keeping an authoritative and timely record of network devices and their settings is a key activity of
which of the following?