1. A technician is assigned to secure a basic wireless network. Which of the following authentication protocols should the technician use to perform this task? (Choose two.)(Select 2answers)
A) A. RDP B) B. SNMP C) C. WPA2 D) D. EAP E) E. SSL
2. Which of the following networking devices operates at Layer1?
A) A. Router B) B. Firewall C) C. Hub D) D. Bridge
3. Which of the following storage network technologies inherently leverages block-level storage?
A) A. NAS B) B. SAN C) C. FCoE D) D. iSCSI E) E. FTP
4. A technician is responsible for configuring a new firewall. The hardware team has already installed, powered, and connected the system. Which of the following types of documentation should the technician utilize to complete the task?
A) A. Rack diagram B) B. IDF/MDF documentation C) C. Network performance baseline D) D. Logical and physical diagrams
5. A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?
A) A. Port security B) B. MAC filtering C) C. Network access control D) D. Captive portal
Leave a comment