Which of the following communication technologies would…
Which of the following communication technologies would MOST likely be used to increase bandwidth over an
existing fiber optic network by combining multiple signals at different wavelengths?
Which of the following is MOST likely the source of the…
A desktop computer is connected to the network and receives an APIPA address but is unable to reach the
VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the
following is MOST likely the source of the problem?
Which of the following must the technician configure on…
A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will beused. The network technician must add a switch to the room through which the laptops will connect for full
network access. Which of the following must the technician configure on a switch port, for both switches, in
order to create this setup?
Which of the following should be implemented to prevent…
A technician is setting up a new network and wants to create redundant paths through the network. Which of
the following should be implemented to prevent performance degradation?
Which of the following protocols must be implemented in…
Which of the following protocols must be implemented in order for two switches to share VLAN information?
Which of the following should an administrator implemen…
A company has had several virus infections over the past few months. The infections were caused by
vulnerabilities in the application versions that are being used. Which of the following should an administrator
implement to prevent future outbreaks?
Which of the following is the MOST likely mitigation fo…
An outside organization has completed a penetration test for a company. One of the items on the report is
reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation
for this reported item?
Which of the following would be required to resolve the…
A company has implemented the capability to send all log files to a central location by utilizing an encrypted
channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the
company’s encryption to become unsecure. Which of the following would be required to resolve the exploit?
Which of the following requires the network administrat…
Which of the following requires the network administrator to schedule a maintenance window?
Which of the following should the technician perform so…
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment
connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the
latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as
quickly as possible?