Ensurepass

QUESTION 321

Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?

 

A.      Physical

B.      Logical

C.      Software

D.      Authentication

 

Correct Answer: A

 

 

QUESTION 322

Which of the following has a MAXIMUM distance of 300 meters (984 feet)?

 

A.      1000BaseT

B.      10GBaseSW

C.      100BaseFX

D.      100BaseTX

 

Correct Answer: B

 

 

QUESTION 323

Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?

 

A.      Network diagram

B.      Performance baseline

C.      Network security procedure

D.      Company policy

 

Correct Answer: A

 

 

QUESTION 324

Which of the following is a disadvantage of using the EIGRP protocol?

 

A.      It does not scale well.

B.      It converges slower than OSPF.

C.      It is a proprietary protocol.

D.      It is a distance vector protocol.

 

Correct Answer: C

 

 

QUESTION 325

Which of the following routing protocols runs over UDP and determines path based upon distance vectors?

 

A.      RIP

B.      DSI

C.      BGP

D.      ISIS

 

Correct Answer: A

 

 

 

QUESTION 326

Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?

 

A.      66 block

B.      Demarc

C.      Smart jack

D.      110 block

 

Correct Answer: C

 

 

QUESTION 327

An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?

 

A.      Setup an ACL that allows and logs all IP traffic between the two computers

B.      Configure a spanning tree to check for a loop

C.      Setup a span port on the switch to watch for CRC errors

D.      Connect both computers using a crossover cable

 

Correct Answer: D

 

 

QUESTION 328

Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?

 

A.      Switch

B.      Hub

C.      Modem

D.      Repeater

 

Correct Answer: B

 

 

QUESTION 329

Which of the following protocols allow the setup, teardown and streaming of VoIP traffic? (Select TWO)

 

A.      NTP

B.      VNC

C.      RTP

D.      SIP

E.       TLS

 

Correct Answer: CD

 

 

QUESTION 330

Which of the following is a secure method of copying information over a public network?

 

A.      SCP

B.      SMTP

C.      SNMP

D.      TFTP

 

Correct Answer: A

 

 

Comments are closed.