Which of the following devices is used to distribute network traffic equally over multiple links?

Which of the following devices is used to distribute network traffic equally over multiple links?
A. Content filter
B. DNS server
C. Load balancer
D. Proxy server

Answer: C

Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?

Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?
A. Protocol analyzer
B. Cable tester
C. Toner probe
D. Punch down tool

Answer: C

Which of the following allows a central point to simultaneously address other points without addressing all of them?

Which of the following allows a central point to simultaneously address other points without addressing all of them?
A. Multicast
B. Subnetting
C. Unicast
D. Broadcast

Answer: A

Which of the following is an example of two factor authentication?

Which of the following is an example of two factor authentication?
A. Password, device certificate and PIN
B. SSL web server certificate and password
C. User password and administrator password
D. Password and hardware token OTP

Answer: D

Which of the following technologies could be implemented to improve call clarity when using VoIP technology?

Which of the following technologies could be implemented to improve call clarity when using VoIP technology?
A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding

Answer: C

Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?

Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?

image002 - Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?
A. Network security policy
B. Network baseline
C. Logical network diagram
D. Wiring schematic

Answer: C

Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2

Answer: A

Which of the following network devices restricts traffic based on words, signatures, and URLs?

Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer

Answer: B

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?
A. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer

Answer: B