Which of the following firewall rules should a technici…
A company would like to offer free wireless Internet to visiting customers without compromising security on their
internal network.
Which of the following firewall rules should a technician configure to accomplish this?
which of the following is an advantage of a virtual NIC…
When setting up a virtual machine, which of the following is an advantage of a virtual NIC as compared to a
hardware NIC?
Which of the following media is MOST cost-effective for…
A company is building a new 10Gb Ethernet top of rack network.
Which of the following media is MOST cost-effective for this implementation?
Which of the following will identify the routers a pack…
A PC is having trouble connecting to a remote resource.
Which of the following will identify the routers a packet travels through and provide real-time feedback
regarding latency?
which of the following?
In a home network, all clients are accessing the Internet via a single host.
This is an example of which of the following?
Which of the following can be implemented to resolve th…
A network administrator at a large campus has determined that many connectivity issues reported in the
residence halls are due to residents connecting the LAN side of personal routers to the campus network.
Which of the following can be implemented to resolve this problem?
Which of the following services could be run on the VPN…
A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a
backend directory service.
Which of the following services could be run on the VPN concentrator to perform this authentication?
Which of the following is an advantage of utilizing a L…
Which of the following is an advantage of utilizing a Layer 2 switch rather than a hub?
Which of the following change management procedures sho…
A network technician has been asked to add a user to an administrative group on the network.
Which of the following change management procedures should be followed?
Which of the following is the cause of this security issue?
Users report they are receiving an unusual amount of suspicious email from the network administrator.
Which of the following is the cause of this security issue?