An organization wants to implement a method of centrally managing logins to network
services. Which of the following protocols should the organization use to allow for
authentication, authorization and auditing?
A.
MS-CHAP
B.
RADIUS
C.
LDAPS
D.
RSTP
MS-CHAP
According to troubleshooting methodology, which of the following should the technician
doNEXT after determining the most likely probable cause of an issue?
A.
Establish a plan of action to resolve the issue and identify potential effects
B.
Verify full system functionality and, if applicable, implement preventive measures
C.
Implement the solution or escalate as necessary
D.
Test the theory to determine the cause
Test the theory to determine the cause
Which of the following policies is MOST commonly used for guest captive portals?
A.
AUP
B.
DLP
C.
BYOD
D.
NDA
AUP
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP:
The network engineer observes that all users have lost Internet connectivity. Which of the following describes the issue?
A.
The incorrect subnet mask was configured
B.
The incorrect gateway was configured
C.
The incorrect IPaddress was configured
D.
The incorrect interface was configured
The incorrect subnet mask was configured
At which of the following OSI model layers would a technician find an IP header?
A.
Layer 1
B.
Layer 2
C.
Layer 3
D.
Layer 4
Layer 3
Page 1 out of 41 Pages |