which of the following?
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
which of the following is an appropriate response?
When querying a DNS server for an AAAA record, which of the following is an appropriate
response?
which of the following?
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?
Which of the following is the MOST likely cause of the problem?
Joe, a user, reports getting a This page cannot be displayed error message in his web browser.
However, Joe can ping the default gateway. Which of the following is the MOST likely cause of the
problem?
which of the following purposes?
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO).
Which of the following tools can the administrator use to determine where along the path the fiber is broken?
A network administrator knows that one of the fibers in an underground fiber run is broken, but
does not know where it is broken. Which of the following tools can the administrator use to
determine where along the path the fiber is broken?
which of the following cable types should Lisa use?
Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use?
Which of the following applications are extremely sensitive to latency?
Which of the following applications are extremely sensitive to latency? (Select TWO).
Which of the following improves wireless performance by allowing only one wireless transmission on the network
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?
Which of the following uses IPSec to provide encryption?
Which of the following uses IPSec to provide encryption?