Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

A network technician needs to connect a new user to the company’s Wi-Fi network called SSID: business. When attempting to connect, two networks are listed as possible choices: SSID: business and SSID: myaccess. Which of the following attacks is occurring?

A.

On-path

B.

Rogue AP

C.

Evil twin

D.

Tailgating

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

During a VoIP call, a user notices inconsistent audio and logs an incident ticket. A network administrator notices inconsistent delays in arrival of the RTP packets. Which of the following troubleshooting tools should the network administrator use to determine the issue?

A.

Toner and probe

B.

Protocol analyzer

C.

Cable tester

D.

Spectrum reader

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Which of the following standards enables the use of an enterprise authentication for network access control?

A.

802.1Q

B.

802.1X

C.

802.3bt

D.

802.11h

A network administrator is extending a network beyond the primary equipment location. Which of the following is where the administrator should install additional network switches?

A.

MDF

B.

VPC

C.

VXLAN

D.

IDF

Which of the following would most likely be used as a replacement for a traditional VPN for remote users?

A.

SD-WAN

B.

SASE

C.

Site-to-site VPN

D.

Reverse proxy

Which of the following ports should a network administrator enable for encrypted login to a network switch?

A.

22

B.

23

C.

80

D.

123

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.