Which of the following should be implemented?
A user wants to send information and ensure that it was not modified during transmission. Which of
the following should be implemented?
which layer of the TCP/IP model would cabling exist?
At which layer of the TCP/IP model would cabling exist?
Which of the following would BEST complete this objective?
A network administrator needs to configure a port on the switch that will enable all packets on a
particular switch to be monitored. Which of the following would BEST complete this objective?
Which of the following VPN technologies uses IKE and ISAKMP for key exchange?
Which of the following VPN technologies uses IKE and ISAKMP for key exchange?
which port to disable?
When a loop occurs, which of the following STP components determines which port to disable?
which of the following ACL entries is the cause?
A user reports that they are unable to access a new server but are able to access all other network
resources. Based on the following firewall rules and network information, which of the following ACL
entries is the cause?
User’s IP: 192.168.5.14
Server IP: 192.168.5.17
Firewall rules:
Permit 192.168.5.16/28 192.168.5.0/28
Permit 192.168.5.0/24 192.168.4.0/24
Permit 192.168.4.0/24 192.168.5.0/24
Deny 192.168.5.0/28 192.168.5.16/28
Deny 192.168.14.0/24 192.168.5.16/28
Deny 192.168.0.0/24 192.168.5.0/24
Which of the following would MOST likely cause them to lose their connection?
A user reports that they keep getting disconnected on the wireless network. After further
investigation, the technician confirms that this occurs only in that user’s office. Which of the
following would MOST likely cause them to lose their connection?
Which of the following MOST likely caused the issue?
Several users are reporting that they are unable to connect to the network. After further
investigation, the network administrator notices that a newly configured Layer 2 device lost its
configuration. Which of the following MOST likely caused the issue?
Which of the following would be used as the encryption method?
A home user wishes to secure the wireless network using strong encryption, so they decide to use
AES. Which of the following would be used as the encryption method?
Which of the following tools could the technician BEST use to troubleshoot this issue?
A user reports that one of their critical programs no longer functions after a recent router upgrade in
the office. A network technician is called in to troubleshoot the issue and documentation shows that
the software needs full open connections over ports 558, 981, and 382 in order to function. Which of
the following tools could the technician BEST use to troubleshoot this issue?