Which of the following protocols resolves IP addresses to MAC addresses?
Which of the following protocols resolves IP addresses to MAC addresses?
Which of the following security methods is used to attract users attempting to gain unauthorized access to var
Which of the following security methods is used to attract users attempting to gain unauthorized access to
various systems within a single network?
Which of the following settings would need to be modified to provide wireless access toall visitors?
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of
three different buildings with the configurations listed below. Wireless network in Building A and C is used
exclusively for internal employees and Building B is used for visitors and requires no additional configuration on
their devices. Which of the following settings would need to be modified to provide wireless access toall
visitors?
Building A Building B Building C
Channel: 2 Channel: 6 Channel: 11
Encryption: WPA2 Encryption: WPA2 Encryption: WPA2
Which of the following settings would need to be modified to provide the BEST wireless experience for all empl
Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure
is comprised of three different buildings with the configurations listed below. Wireless network in Building A and
C is used exclusively for internal employees and Building B is used for visitors and requires no additional
configuration on their devices. Which of the following settings would need to be modified to provide the BEST
wireless experience for all employees as they move between buildings?
Building A Building B BuildingC
Channel: 1 Channel: 6 Channel:11
Encryption: WPA2 Encryption: Open Encryption: WPA2
SSID. CorpSSID. GuestSSID. Sales
Which of the following port numbers is used for SNMP?
Which of the following port numbers is used for SNMP?
Which of the following should the technician consider when implementing the network?
A technician has been given the task to install a wireless network in a user’s home. Which of the following
should the technician consider when implementing the network? (Select TWO).
Whichof the following tools should a technician use to BEST troubleshoot this issue?
Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Whichof the
following tools should a technician use to BEST troubleshoot this issue?
Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput
Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical
throughput of only 54Mbps?
Which of the following is the definition of a DNS server?
Which of the following is the definition of a DNS server?
Which of the following features can BEST be used tofacilitate authorized remote access to a network?
Which of the following features can BEST be used tofacilitate authorized remote access to a network?