Which of the following should be configured to allow this?
A technician wants to separate networks on a switch. Which of the following should be configured to allow this?
Which of the following should the technician do NEXT?
A user does not have network connectivity. While testing the cable the technician receives the below reading
on the cable tester:
1———–1
2———–2
3———–3
4———–4
5———–5
6———–6
7———–7
8———–8
Which of the following should the technician do NEXT?
Which of the following configurations should be considered for these requirements?
A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following
configurations should be considered for these requirements? (Select TWO).
Which of the following practices allows other technicians to quickly return the network to normal speeds?
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow
performance. Which of the following practices allows other technicians to quickly return the network to normal
speeds?
Which of the following would a network administrator recommend to satisfy fault tolerance needs withinthe data
Which of the following would a network administrator recommend to satisfy fault tolerance needs withinthe
datacenter?
Which of the following configurations should be used in this scenario?
During a disaster recovery test, several billing representatives need to be temporarily setup to take payments
from customers. It has been determined that this will need to occur over a wireless network, with security being
enforced where possible. Which of the following configurations should be used in this scenario?
Which of the following wiring distribution types, often found in company closets, is used to connect wiring fr
Which of the following wiring distribution types, often found in company closets, is used to connect wiring from
individual offices to the main LAN cabling?
Which of the following network access security methods ensures communication occurs over a secured, encrypted
Which of the following network access security methods ensures communication occurs over a secured,
encrypted channel, even if the data uses the Internet?
Which of the following is the difference between 802.11b and 802.11g?
Which of the following is the difference between 802.11b and 802.11g?
Which of the following will allow the network administrator to quickly isolate the remote router…?
Users are reporting that some Internet websites arenot accessible anymore. Which of the following will allow
the network administrator to quickly isolate the remote router that is causing the network communication issue,
so that the problem can be reported to the appropriate responsible party?