Q) Network concept split horizon is designed to prevent any of the following?
a) Large routing tables
b) Duplicate addresses
Q) The company must implement a strong authentication by adding authentication factor in their wireless system, which is currently only supports WPA pre-shared keys. The authentication system and backend supports EAP TTLS. Which of the following, if the network administrator to implement?
a) PKI with user authentication
b) 802.1x using EAP with MSCHAPv2
c) WPA2 complex with the common key
d) Filtering MAC-addresses with IP filtering.
Q) The client is engaged in theft of equipment from the data center. Which of the following will ensure a high level of physical security for the customer?
a) Cipher lock
b) proximity reader
c) Swipe the magnetic key
d) man trap
e) Cable TV
Q) The administrator would like to check your phone system with an open source-based decision to invest in equipment and telephones. Which of the following, if the administrator do to better test the software?
a) Creating a virtual IP-phones in the lab, which use the STP
b) Deployment of open source solutions VDI to create a test lab
c) Deployment of new SIP devices and connect to it from the phone application, open source
d) Creating a virtual PBX and connect to it from the phone application, SIP
Q) Offsite backup companies participating in the study are not recycling obsolete entries. This is most likely due to:
a) the process of eDiscovery
b) custody violations chain
c) data transfer request
d) legal hold notice
Q) The campus should provide a wireless connection in the cafeteria with a minimum of WAPs. Which of the following types of antenna will provide the best coverage?
a) high gain