Which of the following is the malicious student impleme…
A malicious student is blocking mobile devices from connecting to the internet when other students are in the
classroom. Which of the following is the malicious student implementing?
which of the following network segmentation techniques?
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer
3 capable in order to more adequately route packages. This is an example of which of the following network
segmentation techniques?
Which of the following is an addressing scheme that wil…
Ann, a network technician is preparing to configure a company’s network. She has installed a firewall to allow
for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP
address from the internet, but they should be able to communicate with remote networks after receiving a
proper IP address. Which of the following is an addressing scheme that will work in this situation?
Which of the following is a connectionless protocol?
Which of the following is a connectionless protocol? (Select TWO)
Which of the following should be performed to verify th…
A network administrator is following best practices to implement firewalls, patch management and policies on
the network. Which of the following should be performed to verify the security controls in place?
which of the following wireless technologies?
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?
Which of the following should be one FIRST to resolve t…
A customer is attempting to download a file from a remote FTP server, but receives an error that a connection
cannot be opened. Which of the following should be one FIRST to resolve the problem?
Which of the following is the BEST way to configure the…
A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients
should not have visibility to one another but should have visibility to the wired users. Users must seamlessly
migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the
BEST way to configure the new wireless network in the new building?
Which of the following should the technician use to ver…
While monitoring the network, a technician notices that the network traffic to one of the servers is extremely
high. Which of the following should the technician use to verify if this is a concern?
Which of the following servers should the technician im…
A technician needs to install a server to authenticate remote users before they have access to corporate
network resources when working from home. Which of the following servers should the technician implement?