Which of the following troubleshooting methods should t…
A network technician responds to a customer reporting that a workstation keeps losing its network connection.
The user explains that it occurs randomly and it happens several times throughout the day. Which of the
following troubleshooting methods should the technician perform FIRST?
Which of the following should the technician check FIRST?
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on
the network. Which of the following should the technician check FIRST?
which of the following OSI layers?
As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the
following OSI layers? (Select TWO)
Which of the following is the MOST likely reason why th…
Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The
router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected
to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP address.
Which of the following is the MOST likely reason why the router is not receiving a DHCP address?
Which of the following protocols is considered a hybrid…
Which of the following protocols is considered a hybrid routing protocol?
Which of the following is the MOST common connector tha…
A network technician has been asked to make the connections necessary to add video transported via fiber
optics to the LAN within a building. Which of the following is the MOST common connector that will be used on
the switch to connect the media converter?
Which of the following ACL should the technician configure?
A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the
192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select TWO)
Which of the following is the best option?
A technician is concerned about security and is asked to set up a network management protocol. Which of the
following is the best option?
which of the following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?
which of the following technologies to prevent unauthor…
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from
traversing the firewall?