Which of the following should the administrator use?
An administrator has been asked to connect an analog phone cabling in a server room. Which of the following should the administrator use?
Which of the following security measures could the administrator use to set up this functionality?
An administrator wants to eliminate remote access to a network from all users, except those users in the administrator# s own country. Which of the following security measures could the administrator use to set up this functionality?
Which of the following authentication methods is MOST secure?
Which of the following authentication methods is MOST secure?
Which of the following network topologies?
Which of the following network topologies, when a single machines cable breaks, would only affect one network device and not the rest of the network?
which of the following?
The term virtual switch refers to which of the following?
Which of the following methods would be BEST to accomplish this?
A technician wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?
Which of the following rules will prevent this?
A network technician has been notified that several PCs are infected and are sending spam emails. The technician wants to add a rule to the firewall to prevent the sending of emails from the internal network. Which of the following rules will prevent this?
Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following protocols could be used?
A network technician is setting up a router and wants to ensure fast convergence of the routing information. Which of the following protocols could be used?
Which of the following tools can be used to identify the IP and MAC address of the users PC?
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the users PC?