Which of the following should be implemented?
A network administrator needs to implement a monitoring tool and be able to send log information
to a server and receive log information from other clients. Which of the following should be
implemented? (Select TWO).
Which of the following could be the problem?
A technician has low signal strength connecting two wireless bridges. Which of the following could
be the problem?
Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?
Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?
Which of the following does Kerberos use to authenticate?
Which of the following does Kerberos use to authenticate?
Which of the following would allow the user to connect to network resources?
A user is unable to access any network resources. The IP configuration of the workstation is as
follows:
IP Address: 192.168.10.32
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.10.46
Which of the following would allow the user to connect to network resources?
Which of the following DNS records is used to identify a domain’s SMTP server?
Which of the following DNS records is used to identify a domain’s SMTP server?
Which of the following TCP ports are used by FTP?
Which of the following TCP ports are used by FTP? (Select TWO).
Which of the following protocols is MOST commonly used for the transfer of router configuration files?
Which of the following protocols is MOST commonly used for the transfer of router configuration
files?
Which of the following security methods is used to attract users attempting to gain unauthorized access to var
Which of the following security methods is used to attract users attempting to gain unauthorized
access to various systems within a single network?
Which of the following settings would need to be modified to provide wireless access to all visitors?
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is
comprised of three different buildings with the configurations listed below. Wireless network in
Building A and C is used exclusively for internal employees and Building B is used for visitors and
requires no additional configuration on their devices. Which of the following settings would need to
be modified to provide wireless access to all visitors?
Building A Building B Building C
Channel: 2 Channel: 6 Channel: 11
Encryption: WPA2 Encryption: WPA2 Encryption: WPA2
