An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe
Which of the following is the default subnet mask for a Class B address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
Which of the following are characteristic of jumbo frames? (Select TWO).
A. Commonly used on SAN
B. MTU size greater than 1500
C. MTU size greater than 10000
D. Commonly used on laaS
E. MTU size greater that 12000
A network technician is installing a new wireless network in a small office. Due to environment concerns, The customer wants the network to run exclusively on the %GHz frequency. Which of the following wireless technologies should the technician install meet this requirement? (Select TWO).
A. 802.11ac
B. 802 11b
C. 802 11g
D. 802.11n
E. Bluetooth
F. z-Ware
Which of the following protocols can be both connection-oriented and connectionless?
A. 20 FTP
B. 53 DNS
C. 67 DHCP
D. 80 HTTP
A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?
A. DHCP scrope
B. DHCP lease
C. Default gateway
D. DNS zone
An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring?
A. Phishing
B. DDoS
C. Evil twin
D. MITM
E. OCSP stapling
A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedues for removing sensitive information and configurations from surplus equipment?
A. System life-cycle procedures
B. Off-boarding procedures
C. Safety procedures
D. Appropriate use policy
A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)
A. Disabling unused ports
B. Upgrading firmware
C. Using secure protocols
D. File hashing
E. MAC filtering
F. Configuring a honeypot
A company's web-based application has a database that is set up for high availability in case of a failure. Which of the following is necessary to achieve this type of setup?
A. A virtual IP pointing to the active DB
B. A static IP pointing to the passive DB
C. A private IP pointing to the web front end
D. A private IP pointing to the web proxy