A) Aggregates switch logs for easier review and correlation
B) Polls SNMP-enabled server logs for current status
C) Distributes logging applications to monitoring servers
D) Purges switch logs when they reach capacity
Correct Answer
verified
Multiple Choice
A) Transceiver mismatch
B) Crosstalk
C) Jitter
D) Open/short on the cable
Correct Answer
verified
Multiple Choice
A) 802.11a
B) 802.11ac
C) 802.11b
D) 802.11n
Correct Answer
verified
Multiple Choice
A) Physical
B) Network
C) Transport
D) Data link
Correct Answer
verified
Multiple Choice
A) Application control
B) User identification
C) Network address translation
D) Virtual private networking
E) High availability
F) Access control rules
Correct Answer
verified
Multiple Choice
A) NAS
B) iSCSI
C) SAN
D) FCoE
Correct Answer
verified
Multiple Choice
A) 802.11a
B) 802.11ac
C) 802.11b
D) 802.11g
E) 802.11n
Correct Answer
verified
Multiple Choice
A) Server room
B) Equipment closet
C) Demarcation point
D) Intermediate distribution frame
Correct Answer
verified
Multiple Choice
A) Logical diagram
B) Physical diagram
C) Network baseline
D) Change management log
Correct Answer
verified
Multiple Choice
A) Average bandwidth usage
B) Error rate on trunk ports
C) Packet drops to the ISP
D) Processor utilization for the Internet router
Correct Answer
verified
Multiple Choice
A) DB-9
B) RS-232
C) DB-25
D) RJ-45
Correct Answer
verified
Multiple Choice
A) Adding a fingerprint reader to each workstation and providing a RSA authentication token
B) Adding a fingerprint reader and retina scanner
C) Using a smart card and RSA token
D) Enforcing a stronger password policy and using a hand geometry scan
Correct Answer
verified
Multiple Choice
A) DHCP relay
B) DHCP exclusion
C) DHCP option
D) DHCP reservation
Correct Answer
verified
Multiple Choice
A) Channel 6
B) Channel 7
C) Channel 9
D) Channel 10
Correct Answer
verified
Multiple Choice
A) Bridge
B) Hub
C) Patch panel
D) Load balancer
Correct Answer
verified
Multiple Choice
A) Incorrect cable type
B) Attenuation
C) Incorrect pinout
D) Bad ports
Correct Answer
verified
Multiple Choice
A) A vulnerability scan
B) A port scan
C) A traffic log
D) A packet capture
Correct Answer
verified
Multiple Choice
A) Packet sniffer
B) Bandwidth tester
C) Port scanner
D) Protocol analyzer
Correct Answer
verified
Multiple Choice
A) BPDUs entering the root bridge are ignored.
B) The STP root bridge cannot be changed.
C) Broadcast storms entering from a root port are blocked.
D) Loop protection is enabled on the root port of a switch.
Correct Answer
verified
Multiple Choice
A) TFTP
B) DTLS
C) DNS
D) SNMP
Correct Answer
verified
Showing 361 - 380 of 829
Related Exams