which of the following?
Various hypervisor guests are configured to use different VLANs in the same virtualization environment through
which of the following?
Which of the following protocols utilizes 3DES encrypti…
Which of the following protocols utilizes 3DES encryption by default?
Which of the following should the technician review to …
A network technician is working on a large project involving the cabling of a new commercial building. The
project involves working with a variety of toxic liquids, some of which require special handling. The technician
wants to gain more insight into how items should be handled and stored, and what safety considerations must
be made for each item being utilized on the project. Which of the following should the technician review to
gather the information needed?
Which of the following Ethernet standards should be used?
An administrator is upgrading the switches in the server room to support 10Gbps of throughput. The switch will
need to take advantage of the existing CAT6a lines that are run to each server. Which of the following Ethernet
standards should be used?
which of the following documents?
A company-wide audit revealed employees are using company laptops and desktops for personal gain. As a
result, the company has incorporated the phrase “Company-owned IT assets are to be used to perform
authorized company business only’ in which of the following documents?
Which of the following applications is MOST likely bein…
A technician has terminated a cable on the datacenter with an RJ-11 connector. Which of the following
applications is MOST likely being used?
Which of the following is the MOST likely cause?
A technician is tasked with troubleshooting a network’s slowness. While troubleshooting, the technician is
unable to ping any external websites. Users report they are able to access the sites using the web browsers.
Which of the following is the MOST likely cause?
Which of the following should be set on the uplink port…
A technician needs to set up uplink ports for multiple switches to communicate with one another. ALL VLANs
should be transferred from the designed server switch. Which of the following should be set on the uplink ports
if VLAN 1 is not the management VLAN? (Select two.)
Which of the following firewall ports must be opened to…
A company has decided to upgrade its legacy phone system to VoIP. The new phones will download the
configurations from a TFTP server each time they boot up. Which of the following firewall ports must be opened
to ensure the phones can communicate with the server?
Which of the following anti-malware solutions should be…
Which of the following anti-malware solutions should be implemented to deter attackers from loading custom
files onto a distributed target platform?