<< Prev Question Next Question >>

Question 129/150

Which of the following allows a standard user to log in to multiple resources with one account?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: A newtwork administrator needs to create an SVI on a Layer 3...
Question 2: Which of the following is most likely responsible for the se...
Question 3: Which of the following can be used when a server at a remote...
Question 4: A network technician needs to install patch cords from the U...
Question 5: Which of the following is used to estimate the average life ...
Question 6: A network administrator is troubleshooting issues with a DHC...
Question 7: Which of the following does a full-tunnel VPN provide?...
Question 8: A network administrator suspects users are being sent to mal...
Question 9: A technician is planning an equipment installation into a ra...
Question 10: A network engineer needs to change, update, and control APs ...
Question 11: A network administrator configured a router interface as 10....
Question 12: Which of the following allows a user to connect to an isolat...
Question 13: A data center administrator is evaluating the use of jumbo f...
Question 14: Which of the following steps of the troubleshooting methodol...
Question 15: Which of the following is used to stage copies of a website ...
Question 16: Which of the following best describes a group of devices tha...
Question 17: A network technician is designing a LAN for a new facility. ...
Question 18: A network administrator needs to assign IP addresses to a ne...
Question 19: A network engineer is deploying switches at a new remote off...
Question 20: A network engineer is completing a new VoIP installation, bu...
Question 21: After changes were made to a firewall, users are no longer a...
Question 22: A network technician replaced an access layer switch and nee...
Question 23: A network administrator recently updated configurations on a...
Question 24: Which of the following cloud service models most likely requ...
Question 25: Which of the following routing protocols is most commonly us...
Question 26: A network consultant needs to decide between running an ethe...
Question 27: A technician is troubleshooting a computer issue for a user ...
Question 28: Which of the following should be used to obtain remote acces...
Question 29: During a recent security assessment, an assessor attempts to...
Question 30: A network administrator is configuring access points for ins...
Question 31: Which of the following is a characteristic of the applicatio...
Question 32: A user's desk has a workstation and an IP phone. The user is...
Question 33: Which of the following is the greatest advantage of maintain...
Question 34: Which of the following indicates a computer has reached end-...
Question 35: While troubleshooting a VoIP handset connection, a technicia...
Question 36: Which of the following can support a jumbo frame?...
Question 37: Which of the following is the best VPN to use for reducing d...
Question 38: Which of the following protocols provides remote access util...
Question 39: Users are unable to access files on their department share l...
Question 40: A systems administrator is investigating why users cannot re...
Question 41: A network technician receives a new ticket while working on ...
Question 42: Which of the following is the most closely associated with s...
Question 43: A network engineer receives a vendor alert regarding a vulne...
Question 44: A network technician is troubleshooting a web application's ...
Question 45: Which of the following attacks would most likely cause dupli...
Question 46: A junior network technician at a large company needs to crea...
Question 47: A virtual machine has the following configuration: *IPv4 add...
Question 48: A network administrator is planning to host a company applic...
Question 49: Which of the following appliances provides users with an ext...
Question 50: Which of the following is enforced through legislation?...
Question 51: A customer needs six usable IP addresses. Which of the follo...
Question 52: A network administrator has been tasked with configuring a n...
Question 53: A user is unable to navigate to a website because the provid...
Question 54: A company experiences an incident involving a user who conne...
Question 55: A wireless technician wants to implement a technology that w...
Question 56: Which of the following technologies are X.509 certificates m...
Question 57: After running a Cat 8 cable using passthrough plugs, an elec...
Question 58: A company reports that their facsimile machine no longer has...
Question 59: A network administrator upgraded the wireless access points ...
Question 60: Which of the following is associated with avoidance, accepta...
Question 61: Users are experiencing significant lag while connecting to a...
Question 62: Which of the following connector types would most likely be ...
Question 63: A company receives a cease-and-desist order from its ISP reg...
Question 64: Which of the following is the correct order of components in...
Question 65: A research facility is expecting to see an exponential incre...
Question 66: A technician is planning an equipement installation into a r...
Question 67: A company recently implemented a videoconferencing system th...
Question 68: A group of users cannot connect to network resources. The te...
Question 69: Which of the following network devices converts wireless sig...
Question 70: Which of the following could provide a lightweight and priva...
Question 71: A network administrator is developing a method of device mon...
Question 72: A network administrator is unable to ping a remote server fr...
Question 73: An organization has four departments that each need access t...
Question 74: A technician is implementing a new SD-WAN device with a defa...
Question 75: After a recent security awareness phishing campaign, the cyb...
Question 76: A network engineer configures a new switch and connects it t...
Question 77: A company is hosting a secure that requires all connections ...
Question 78: An IT department asks a newly hired employee to use a person...
Question 79: Which of the following should a company implement in order t...
Question 80: A medical clinic recently configured a guest wireless networ...
Question 81: A network administrator needs to change where the outside DN...
Question 82: Which of the following should be configured so users can aut...
Question 83: An ISP provided a company with a pre-configured modem and fi...
Question 84: Due to concerns around single points of failure, a company d...
Question 85: Users are unable to access files on their department share l...
Question 86: After a recent power outage, users are reporting performance...
Question 87: A technician needs to identify a computer on the network tha...
Question 88: A company is purchasing a 40Gbps broadband connection servic...
Question 89: Which of the following offers the ability to manage access a...
Question 90: Which of the following connectors allows a singular QSFP tra...
Question 91: A network administrator is in the process of installing 35 P...
Question 92: Which of the following is an XML-based security concept that...
Question 93: Which of the following are the best device-hardening techniq...
Question 94: A company has observed increased user traffic to gambling we...
Question 95: A network administrator notices uncommon communication betwe...
Question 96: Which of the following routing protocols uses an autonomous ...
Question 97: Which of the following network cables involves bounding ligh...
Question 98: A network technician is terminating a cable to a fiber patch...
Question 99: Which of the following can be implemented to add an addition...
Question 100: Which of the following must be implemented to securely conne...
Question 101: Which of the following will allow secure, remote access to i...
Question 102: Users cannot connect to an internal website with an IP addre...
Question 103: Which of the following is the best way to keep devices on du...
Question 104: Which of the following kinds of targeted attacks uses multip...
Question 105: A network engineer needs to deploy an access point at a remo...
Question 106: Which of the following is the next step to take after succes...
Question 107: Which of the following disaster recovery concepts is calcula...
Question 108: Users at a satellite office are experiencing issues when usi...
Question 109: A university is implementing a new campus wireless network. ...
Question 110: A network administrator is configuring a new switch and want...
Question 111: An administrator is setting up an SNMP server for use in the...
Question 112: A company wants to implement data loss prevention by restric...
Question 113: A network engineer runs ipconfig and notices that the defaul...
Question 114: Which of the following is the most cost-effective way to saf...
Question 115: A network administrator needs to fail over services to an of...
Question 116: Which of the following disaster recovery metrics is used to ...
Question 117: A user's VoIP phone and workstation are connected through an...
Question 118: A technician needs to set up a wireless connection that util...
Question 119: Which of the following routing technologies uses an attribut...
Question 120: Which of the following steps in the troubleshooting methodol...
Question 121: Which of the following protocols has a default administrativ...
Question 122: A network administrator is notified that a user cannot acces...
Question 123: After installing a new wireless access point, an engineer te...
Question 124: Which of the following connectors provides console access to...
Question 125: Which of the following steps in the troubleshooting methodol...
Question 126: A customer recently moved into a new office and notices that...
Question 127: Which of the following most likely requires the use of subin...
Question 128: Which of the following is the part of a disaster recovery (D...
Question 129: Which of the following allows a standard user to log in to m...
Question 130: An organizatin is struggling to get effective coverage using...
Question 131: A small business is deploying new phones, and some of the ph...
Question 132: A network administrator deployed wireless networking in the ...
Question 133: Which of the following most likely determines the size of a ...
Question 134: Which of the following protocol ports should be used to secu...
Question 135: Which of the following should an installer orient a port-sid...
Question 136: A client wants to increase overall security after a recent b...
Question 137: A network administrator has been monitoring the company's se...
Question 138: A secure communication link needs to be configured between d...
Question 139: A network technician is troubleshooting a faulty NIC and tes...
Question 140: Which of the following is created to illustrate the effectiv...
Question 141: A network administrator is configuring a network for a new s...
Question 142: Which of the following fiber connector types is the most lik...
Question 143: Which of the following OSI model layers can utilize a connec...
Question 144: A network administrator is reviewing a production web server...
Question 145: Which of the following attacks utilizes a network packet tha...
Question 146: A network administrator is implementing security zones for e...
Question 147: Which of the following devices can operate in multiple layer...
Question 148: A help desk technician receives a report that users cannot a...
Question 149: A network administrator wants to implement security zones in...
Question 150: A company is implementing a wireless solution in a high-dens...