- (Exam Topic 2)
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).
Correct Answer:
BC
- (Exam Topic 1)
A company is allowing its employees to use their personal computers, tables, and loT devices while at work. However, there are rules and guidelines to which employees must adhere. Which of the following documents applies to these employees?
Correct Answer:
C
- (Exam Topic 3)
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?
Correct Answer:
B
- (Exam Topic 2)
A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?
Correct Answer:
A
- (Exam Topic 1)
A network technician has unable to make a from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?
Correct Answer:
D