Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity?

Correct Answer for the Question – Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? is given below Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO). Dialup DSL SONET Cable WiMAX LTE Correct Answer The Correct Answer … Read more

Which of the following default ports was MOST likely opened?

Correct Answer for the Question – Which of the following default ports was MOST likely opened? is given below An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened?(Select TWO) FTP use both port 21 and 20 (port 21 for … Read more

Which of the following tools should the technician have on hand to install the bulk CAT6 cable?

Correct Answer for the Question – Which of the following tools should the technician have on hand to install the bulk CAT6 cable? is given below A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand … Read more

Which of the following IP address/subnet mask combinations represent a broadcast address?

Correct Answer for the Question – Which of the following IP address/subnet mask combinations represent a broadcast address? is given below Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO). A broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive … Read more

Which of the following exist at layer three of the OSI model?

Correct Answer for the Question – Which of the following exist at layer three of the OSI model? is given below Which of the following exist at layer three of the OSI model? (Select TWO).answer is valid. NIC Switch Frame Packet Router Cable Correct Answer The Correct Answer for this Question is Packet Router The answers … Read more

Which of the following TCP ports are used by FTP?

Correct Answer for the Question – Which of the following TCP ports are used by FTP? is given below Which of the following TCP ports are used by FTP? (Select TWO).FTP uses two ports by default: 21 for sending commands, and 20 for sending data. For instance if you said “FTP ” it would make the … Read more

Which of the following frequencies?

Correct Answer for the Question – Which of the following frequencies? is given below 802.11n can operate at which of the following frequencies? (Select TWO).802.11n is an amendment which improves upon the previous 802.11 standards by adding multiple-input multiple-output antennas (MIMO). 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands 2.4Mhz … Read more

Which of the following are authentication methods that can use AAA authentication?

Correct Answer for the Question – Which of the following are authentication methods that can use AAA authentication? is given below Which of the following are authentication methods that can use AAA authentication? (Select TWO). Kerberos PKI TKIP/AES MS-CHAP RADIUS TACACS+ Correct Answer The Correct Answer for this Question is RADIUS TACACS+ The answers for the … Read more

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model?

Correct Answer for the Question – Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? is given below Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO). Application Physical Presentation Transport Data Link Network … Read more

Which of the following tools would accomplish this?

Correct Answer for the Question – Which of the following tools would accomplish this? is given below An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network.Which of the following tools would accomplish this? (Select TWO).(IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances … Read more