Which of the following performance benefits would multiple domain controllers BEST provide?
A
Explanation:
Fault-tolerant design is a design that enables a system to continue its intended operation, possibly at a reduced level, rather
than failing completely, when some part of the system fails. The term is most commonly used to describe computer-based
systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in
response time in the event of some partial failure
Which of the following tools will scan a network for hosts and provide information on the installed operating system?
B
A technician is sorting patch cables into four bins labeled coaxial, crossover, straight-through, and fiber. The technician has a
cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of
the cable start with a green wire. Into which of the following bins should this cable be placed?
A
Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of
unauthorized traffic are detected on the network?
C
A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has
found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of
the following would MOST likely resolve the connectivity issue?
D
Which of the following connector types would require a punch down tool to attach a network cable to it?
C
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of
following types of authentication is this an example of?
D
A cable with visible space between the ends of the copper wires and the RJ-45 connector will cause which of the following
problems to occur?
B
A forward lookup zone converts which of the following?
B
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is
no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
D
A network administrator is responding to a statement of direction made by senior management to implement network
protection that will inspect packets as they enter the network. Which of the following technologies would be used?
D
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?
C
Which of the following would be used to run an instance of a Layer 2 device within an application?
A
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer.
Which of the following would be the MOST likely reason? (Select TWO).
C D
Explanation:
It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that
the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important
things which can be broken down whenever there is a physical movement.
A network administrator wants to balance the amount of data between two networking cards. Which of the following can be
used for two or more networking cards?
A