Which of the following is an addressing scheme that wil…
Ann, a network technician is preparing to configure a company’s network. She has installed a firewall to allow
for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP
address from the internet, but they should be able to communicate with remote networks after receiving a
proper IP address. Which of the following is an addressing scheme that will work in this situation?
Which of the following is a connectionless protocol?
Which of the following is a connectionless protocol? (Select TWO)
Which of the following should be performed to verify th…
A network administrator is following best practices to implement firewalls, patch management and policies on
the network. Which of the following should be performed to verify the security controls in place?
which of the following wireless technologies?
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?
Which of the following should be one FIRST to resolve t…
A customer is attempting to download a file from a remote FTP server, but receives an error that a connection
cannot be opened. Which of the following should be one FIRST to resolve the problem?A. Ensure that port 20 is open
Which of the following is the BEST way to configure the…
A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients
should not have visibility to one another but should have visibility to the wired users. Users must seamlessly
migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the
BEST way to configure the new wireless network in the new building?
Which of the following should the technician use to ver…
While monitoring the network, a technician notices that the network traffic to one of the servers is extremely
high. Which of the following should the technician use to verify if this is a concern?
Which of the following servers should the technician im…
A technician needs to install a server to authenticate remote users before they have access to corporate
network resources when working from home. Which of the following servers should the technician implement?
which of the following?
A network topology in which all nodes have point to point connections to all other nodes is known as which of
the following?
which of the following?
A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an
example of which of the following?