Which of the following features should be enabled and configured to allow for reliable performance of the VoIP
A customer is implementing a VoIP infrastructure using an existing network. The customer
currently has all network devices on the same subnet and would like the phones to be powered
without the use of an AC adapter. Which of the following features should be enabled and
configured to allow for reliable performance of the VoIP system? (Select THREE).
Which of the following should be enabled on the new network switch?
A company has just installed a new network switch for an expanding department. The company is
also piloting the use of a VoIP phone system for this department. Which of the following should be
enabled on the new network switch?
Which of the following network protocols is used for a secure command line interface for management of network
Which of the following network protocols is used for a secure command line interface for
management of network devices?
Which of the following network troubleshooting methodology steps should the technician do NEXT?
A user is having difficulty connecting a laptop to the company’s network via a wireless connection.
The user can connect to the network via a wired NIC. The technician suspects the laptop’s
wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and
discovers the hardware is working fine. Which of the following network troubleshooting
methodology steps should the technician do NEXT?
Which of the following traffic types is MOST likely using port 25?
An administrator is using a packet sniffer to try to determine what is causing the traffic on the
network. The administrator sees a lot of packets on port 25. Which of the following traffic types is
MOST likely using port 25?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
A network technician is concerned that a user is utilizing a company PC for file sharing and using
a large amount of the bandwidth. Which of the following tools can be used to identify the IP and
MAC address of the user’s PC?
Which of the following is the BEST way to mitigate such an equipment failure?
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT
department would like a way to prevent such an incident in the future. Which of the following is the
BEST way to mitigate such an equipment failure?
Which of the following commands should the technician run FIRST?
A user has network connectivity per the link lights on the NIC, but cannot access any network
resources or the Internet. Which of the following commands should the technician run FIRST?
Which of the following would BEST be used to monitor CPU cycles on the routers?
A network administrator suspects that recent traffic problems could be caused by a high CPU load
on company routers. Which of the following would BEST be used to monitor CPU cycles on the
routers?