N10
QUESTIONs
QUESTIONs
Kartei Details
Karten | 50 |
---|---|
Sprache | English |
Kategorie | Informatik |
Stufe | Andere |
Erstellt / Aktualisiert | 26.04.2017 / 25.07.2019 |
Weblink |
https://card2brain.ch/box/20170426_n10
|
Einbinden |
<iframe src="https://card2brain.ch/box/20170426_n10/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Lernkarteien erstellen oder kopieren
Mit einem Upgrade kannst du unlimitiert Lernkarteien erstellen oder kopieren und viele Zusatzfunktionen mehr nutzen.
Melde dich an, um alle Karten zu sehen.
A company is experiencing accessibility issues reaching services on a cloud-based system.
Which of the following monitoring tools should be used to locate possible outages?
A company is experiencing very slow network speeds of 54Mbps. A technician has been hired
to perform an assessment on the existing wireless network. The technician has
recommended an 802.11n network infrastructure. Which of the following allows 802.11n to
reach higher speeds?
It has been determined by network operations that there is a severe bottleneck on the
company's mesh topology network. The field technician has chosen to use log management
and found that one router is making routing decisions slower than others on the network. This
is an example of which of the following?
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab
equipment connected to her PC. The technician contacts the vendor and determines there is
an incompatibility with the latest IO drivers. Which of the following should the technician
perform so that Ann can get back to work as quickly as possible?
A system administrator has been tasked to ensure that the software team is not affecting the
production software when developing enhancements. The software that is being updated is
on a very short SDLC and enhancements must be developed rapidly. These enhancements
must be approved before being deployed. Which of the following will mitigate production
outages before the enhancements are deployed?
An administrator reassigns a laptop to a different user in the company. Upon delivering the
laptop to the new user, the administrator documents the new location, the user of the device
and when the device was reassigned. Which of the following BEST describes these actions?
Company policies require that all network infrastructure devices send system level
information to a centralized server. Which of the following should be implemented to ensure
the network administrator can review device error information from one central location?
A network technician has been tasked to configure a new network monitoring tool that will
examine interface settings throughout various network devices. Which of the following would
need to be configured on each network device to provide that information in a secure
manner?
Which of the following would be the result of a user physically unplugging a VoIP phone and
connecting it into another interface with switch port security enabled as the default setting?
A company is deploying a new wireless network and requires 800Mbps network throughput.
Which of the following is the MINIMUM configuration that would meet this need?
A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
When two or more links need to pass traffic as if they were one physical link, which of the
following would be used to satisfy the requirement?
A VLAN with a gateway offers no security without the addition of:
Network segmentation provides which of the following benefits?
A network technician must create a wireless link between two buildings in an office park
utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and
minimal weight as it will be mounted on the outside of the building. Which of the following
antenna types is BEST suited for this solution?
A technician has verified that a recent loss of network connectivity to multiple workstations is
due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to
locate its physical location within the wall?
Which of the following is used to authenticate remote workers who connect from offsite?
(Select TWO).
Which of the following network infrastructure implementations would be used to support files
being transferred between Bluetooth-enabled smartphones?
Which of the following would be used in an IP-based video conferencing deployment? (Select
TWO).
Which of the following helps prevent routing loops?
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an
ISP using a POTS line?
An administrator has a virtualization environment that includes a vSAN and iSCSI switching.
Which of the following actions could the administrator take to improve the performance of
data transfers over iSCSI switches?
A network topology that utilizes a central device with point-to-point connections to all other
devices is which of the following?
A technician is connecting a NAS device to an Ethernet network. Which of the following
technologies will be used to encapsulate the frames?
The network install is failing redundancy testing at the MDF. The traffic being transported is a
mixture of multicast and unicast signals. Which of the following would BEST handle the
rerouting caused by the disruption of service?
A company wants to create highly available datacenters. Which of the following will allow the
company to continue to maintain an Internet presence at all sites in the event that a WAN
circuit at one site goes down?
A training class is being held in an auditorium. Hard-wired connections are required for all
laptops that will be used. The network technician must add a switch to the room through
which the laptops will connect for full network access. Which of the following must the
technician configure on a switch port, for both switches, in order to create this setup?
Which of the following communication technologies would MOST likely be used to increase
bandwidth over an existing fiber optic network by combining multiple signals at different
wavelengths?
Which of the following WAN technologies is associated with high latency?
Which of the following provides accounting, authorization, and authentication via a centralized
privileged database, as well as, challenge/response and password encryption?
-
- 1 / 50
-