You can pass the exam with the least time , we contain contain both questions and qnswers for yo to practice.
You can pass the exam just one time!
Free demo are as follows:
NEW QUESTION: 1
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer
A. Time division multiplexing
B. Time division spread spectrum
D. Analog circuit switching
NEW QUESTION: 2
A device operating at Layer 3 of the OSI model uses which of the following protocols to
determine the path to a different network?
NEW QUESTION: 3
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in
the parking lot.
Management requests that the wireless network be changed so it is no longer accessible in public
areas, without affecting the availability inside the building. Which of the following should be changed
on the network?
B. Distance limitations
C. Power levels
D. Channel overlap
NEW QUESTION: 4
Which of the following default ports would need to be open on a firewall to allow remote
NEW QUESTION: 5
A technician is connecting a PC to a switchport. At the wiring closet, the technician is identify
which cable goes from patch panel a connected to the switch to patch panel B connected to the PC.
Which of the following tools should the technician use to resolve the issue?
C. Tone generator
D. Cable tester
NEW QUESTION: 6
A network technician receives a call from a branch office about a problem with its wireless
The user states the office hosting a large meeting that includes some online training with local
The guest users have all brought devices to connect to the guest network at the branch office.
All users are connected to a single WAP and are reporting that connections dropping and network
speeds are unusable.
Which of the following is the MOST likely cause of this issue?
B. Chanel overlapping
C. DCHP exhaustion
NEW QUESTION: 7
Which of the following MUST be implemented to share metrics between routing protocols
within the same router?
A. Route redistribution
B. Dynamic routes
C. Routing loop
D. Routing table
NEW QUESTION: 8
A network technician has just configured NAC for connections using Cat 6 cables.
However, none of the Windows clients can connect to the network.
Which of the following components should the technician check on the Windows workstations?
A. Enable IEEE 802.1x Authentication in Network Interface Card Properties
B. Start the Wireless AutoConfig service in the Services console
C. Start the Wired AutoConfig service in the Services console
D. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties
E. Enable IEEE 802.1q Authentication in Network Interface Card Properties
NEW QUESTION: 9
Which of the following devices are MOST often responsible for 1q tagging? (Select TWO).
E. Network tap
NEW QUESTION: 10
Which of the following should current network performance be compared against to
determine network anomalies?
A. Packet capture
C. Traffic analysis
NEW QUESTION: 11
A typical cell tower will have microwave and cellular antennas. Which of the following
network topologies do these represent? (Choose two.)
NEW QUESTION: 12
Which of the following layers of the OSI model is between the Data Link and Transport layers?
NEW QUESTION: 13
Which of the following devices exist as either hardware or software to assist in routing
traffic? (Select TWO).
A. Layer 2 switch
D. Cable modern
E. Layer 3 switch
NEW QUESTION: 14
Which of the following describes a DNS server?
A. Caches commonly viewed web pages
B. Provides port security for a network
C. Translates an IP address to a name
D. Assigns IP addresses to network devices
NEW QUESTION: 15
Your company recently purchased a new building down the street from the existing office.
For each of the tasks below, select the appropriate antenna type and encryption object for all
wireless access point (AP).
1. Create an encrypted wireless connection between the two buildings that BEST controls signal
propagation, while maximizing security.
2. Restrict the wireless signal generated by the access points (APs) inside Building 1, so that it
minimizes broadcast beyond the building.
3. Maximize wireless coverage inside Building 1.
4. Building 1's internal wireless network is for visitors only and must not require any special
configuration on the visitor's device to connect.
Instructions: When you have completed the simulation, select the Done button to submit.
See explanation below.
Answer is as below in image.
NEW QUESTION: 16
Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Traffic analyzer
B. Load balancer
C. Content filter
D. Layer 2 switch
NEW QUESTION: 17
After a server outage, a technician discovers that a physically damaged fiber cable appears to
be the problem.
After replacing the cable, the server will still not connect to the network.
Upon inspecting the cable at the server end, the technician discovers light can be seen through one
of the two fiber strands.
Which of the following should the technician do FIRST to reconnect the server to the network?
A. Replace the server's single-mode fiber cable with multimode fiber
B. Reverse the fiber strands of the cable and reconnect them to the server
C. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
D. Move the fiber cable to different port on the switch where both strands function
NEW QUESTION: 18
A network technician is deploying mobile phones for a company's sales staff.
Salespeople frequently travel nationally and internationally to meet with clients, and often have to
roam or switch cellular providers. Which of the following standards is the BEST option to fit the
NEW QUESTION: 19
A systems administrator has recently purchased and installed a large electronic signage screen
for the company's parking garage. The screen's management software was installed on a server with
public IP address to allow remote management. The systems administrator is now troubleshooting an
issue with the screen displaying unknown, random, and inappropriate messages. Which of the
following is MOST effective in resolving this issue?
A. Changing the management software's default port
B. Disabling unnecessary services from the server and management software
C. Replacing the management software's self-signed certificate with a valid certificate
D. Changing the management software's default credentials
NEW QUESTION: 20
Which of the following can be done to implement network device hardening (Select TWO).
A. Patch and update
B. Implement spanning tree
C. Perform backups
D. Perform VLAN hopping
E. Enable port mirroring
F. Change default admin password
Network devices come with default credentials, the username and password that enables you to log
into the device for configuration. Changing default credentials should be the first step in hardening a
new device. As with any other system, avoiding common passwords adds security.
Keep network devices up to date. That means upgrading firmware, patching and updating as
necessary to close any security gaps exposed over time.
Services on network devices like routers include common things, like Telnet and HTTP access; and
also things you don't normally see, like TCP and UDP small services, debugging and testing tools that
primarily use ports 20 and lower. If enabled, these services can be used to launch DoS and other
attacks. All modern Cisco devices have these disabled; Cisco's hardening rules insist on disabling
Using secure protocols hardens network devices. Don't use Telnet to access a managed switch or
router, for example, but use SSH so that the communication is encrypted.
Disabling unused ports on network devices enhances port security for access control.
This includes standard IP ports and device ports, both physical and virtual for the latter.
You can get more information in