Which of the following can use a third party back-end LDAP user database for authentication?
Which of the following can use a third party back-end LDAP user database for authentication?
Which of the following is the BEST way to provide the PCs with issues a new IP address?
A technician has spent most of the day replacing a server running DHCP. Some of the users have
begun to call the help desk stating that Internet connection stopped working even after rebooting.
Upon investigation, the users’ PCs with issues all have IP addresses that start with 169.254.x.x.
The technician completes the replacement and powers on the new DHCP server. Which of the
following is the BEST way to provide the PCs with issues a new IP address?
Which of the following would MOST likely be installed?
A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to
prevent on its own. Which of the following would MOST likely be installed?
Which of the following network topologies is ONLY possible between two users?
Which of the following network topologies is ONLY possible between two users?
which action should the technician take to correct Ann’s problem?
Ann, a new user, is unable to communicate on the network from her computer. A technician has
verified that the cables are functioning properly. Based on the information below, which action
should the technician take to correct Ann’s problem?
Computer_ASwitch_A
IP: 10.0.0.60Int VLAN10
SM: 255.255.255.0IP address 10.0.0.1/28
GW: 10.0.0.1Speed 100 Duplex Full
Which of the following tools should the technician use to complete this objective QUICKEST?
A new technician has been tasked with implementing a QoS policy for the Network. The technician
decides it would be best to monitor the information traversing the network to gain statistical
information on ports and protocols utilized. Which of the following tools should the technician use
to complete this objective QUICKEST?
which of the following VLANs?
Users report that they are unable to access the production server with IP address 192.168.30.17.
These users need to be provided access without changing any subnet to VLAN information. The
VLANs configured on the network are listed below:
DepartmentVLAN #Subnet used
Marketing20192.168.20.0/28
Customer Service25192.168.20.64/28
Finance30192.168.30.0/28
WHSE35192.168.30.16/28
Sales40192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
Which of the following wireless standards is the WLAN card MOST likely using?
A technician is installing an 802.11n network. The technician is using a laptop that can connect at
a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but
thinks it could be the type of WLAN card used on the laptop. Which of the following wireless
standards is the WLAN card MOST likely using?
Which of the following firewall rules will block destination telnet traffic to any host with the source IP add
Which of the following firewall rules will block destination telnet traffic to any host with the source
IP address 1.1.1.2/24?
Which of the following addresses is a class B private address?
Which of the following addresses is a class B private address?