Which of the following protocols was MOST likely used o…
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of
the following protocols was MOST likely used on this cable?
Which of the following is MOST likely to use an RJ-11 c…
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a
POTS line?
Which of the following protocols uses label-switching r…
Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?
Which of the following was MOST likely installed that r…
When configuring a new server, a technician requests that an MX record be created in DNS for the new server,
but the record was not entered properly. Which of the following was MOST likely installed that required an MXrecord to function properly?
Which of the following could the technician do to fix t…
A technician just completed a new external website and setup access rules in the firewall. After some testing,
only users outside the internal network can reach the site. The website responds to a ping from the internal
network and resolves the proper public address. Which of the following could the technician do to fix this issue
while causing internal users to route to the website using an internal address?
Which of the following options should Joe configure in …
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options
should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP
addresses, to be able to access the Internet and internal company servers? (Select THREE).
Which of the following should be configured?
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same
address. Which of the following should be configured?
Which of the following provides accounting, authorizati…
Which of the following provides accounting, authorization, and authentication via a centralized privileged
database, as well as, challenge/response and password encryption?
Which of the following is used to authenticate remote w…
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
Which of the following is used to define how much bandw…
Which of the following is used to define how much bandwidth can be used by various protocols on the network?