Which of the following devices would BEST provide this functionality?
A technician is looking to secure an entire network by blocking all non-essential ports. Which of the
following devices would BEST provide this functionality?
Which of the following media types should be recommended for the customer using only a single switch?
A customer wishes to network several computers throughout a large warehouse containing
numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart.
Which of the following media types should be recommended for the customer using only a single
switch?
Which of the following should be implemented in a networked environment carrying teleconferencing packets?
Which of the following should be implemented in a networked environment carrying
teleconferencing packets?
Which of the following cable types would MOST likely be used to establish this connection?
A technician wants to connect a new wireless router to a main network switch. Which of the
following cable types would MOST likely be used to establish this connection?
Which of the following tools should be used?
A technician needs to verify an Ethernet run is functioning properly. Which of the following tools
should be used?
Which of the following methods limits access to a network based on characteristics of the network card?
Which of the following methods limits access to a network based on characteristics of the network
card?
which of the following layers of the OSI model?
A router operates at which of the following layers of the OSI model?
Which of the following network devices would be required to provide this functionality?
An organization wants to perform maintenance on any of its web servers without affecting the
service availability during a scheduled change window. Which of the following network devices
would be required to provide this functionality?
Which of the following is an example of two factor authentication?
Which of the following is an example of two factor authentication?
Which of the following protocols are used for accessing a command line terminal session for management purpose
Which of the following protocols are used for accessing a command line terminal session for
management purposes? (Select TWO).
