<< Prev Question Next Question >>

Question 35/150

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: A newtwork administrator needs to create an SVI on a Layer 3...
Question 2: Which of the following is most likely responsible for the se...
Question 3: Which of the following can be used when a server at a remote...
Question 4: A network technician needs to install patch cords from the U...
Question 5: Which of the following is used to estimate the average life ...
Question 6: A network administrator is troubleshooting issues with a DHC...
Question 7: Which of the following does a full-tunnel VPN provide?...
Question 8: A network administrator suspects users are being sent to mal...
Question 9: A technician is planning an equipment installation into a ra...
Question 10: A network engineer needs to change, update, and control APs ...
Question 11: A network administrator configured a router interface as 10....
Question 12: Which of the following allows a user to connect to an isolat...
Question 13: A data center administrator is evaluating the use of jumbo f...
Question 14: Which of the following steps of the troubleshooting methodol...
Question 15: Which of the following is used to stage copies of a website ...
Question 16: Which of the following best describes a group of devices tha...
Question 17: A network technician is designing a LAN for a new facility. ...
Question 18: A network administrator needs to assign IP addresses to a ne...
Question 19: A network engineer is deploying switches at a new remote off...
Question 20: A network engineer is completing a new VoIP installation, bu...
Question 21: After changes were made to a firewall, users are no longer a...
Question 22: A network technician replaced an access layer switch and nee...
Question 23: A network administrator recently updated configurations on a...
Question 24: Which of the following cloud service models most likely requ...
Question 25: Which of the following routing protocols is most commonly us...
Question 26: A network consultant needs to decide between running an ethe...
Question 27: A technician is troubleshooting a computer issue for a user ...
Question 28: Which of the following should be used to obtain remote acces...
Question 29: During a recent security assessment, an assessor attempts to...
Question 30: A network administrator is configuring access points for ins...
Question 31: Which of the following is a characteristic of the applicatio...
Question 32: A user's desk has a workstation and an IP phone. The user is...
Question 33: Which of the following is the greatest advantage of maintain...
Question 34: Which of the following indicates a computer has reached end-...
Question 35: While troubleshooting a VoIP handset connection, a technicia...
Question 36: Which of the following can support a jumbo frame?...
Question 37: Which of the following is the best VPN to use for reducing d...
Question 38: Which of the following protocols provides remote access util...
Question 39: Users are unable to access files on their department share l...
Question 40: A systems administrator is investigating why users cannot re...
Question 41: A network technician receives a new ticket while working on ...
Question 42: Which of the following is the most closely associated with s...
Question 43: A network engineer receives a vendor alert regarding a vulne...
Question 44: A network technician is troubleshooting a web application's ...
Question 45: Which of the following attacks would most likely cause dupli...
Question 46: A junior network technician at a large company needs to crea...
Question 47: A virtual machine has the following configuration: *IPv4 add...
Question 48: A network administrator is planning to host a company applic...
Question 49: Which of the following appliances provides users with an ext...
Question 50: Which of the following is enforced through legislation?...
Question 51: A customer needs six usable IP addresses. Which of the follo...
Question 52: A network administrator has been tasked with configuring a n...
Question 53: A user is unable to navigate to a website because the provid...
Question 54: A company experiences an incident involving a user who conne...
Question 55: A wireless technician wants to implement a technology that w...
Question 56: Which of the following technologies are X.509 certificates m...
Question 57: After running a Cat 8 cable using passthrough plugs, an elec...
Question 58: A company reports that their facsimile machine no longer has...
Question 59: A network administrator upgraded the wireless access points ...
Question 60: Which of the following is associated with avoidance, accepta...
Question 61: Users are experiencing significant lag while connecting to a...
Question 62: Which of the following connector types would most likely be ...
Question 63: A company receives a cease-and-desist order from its ISP reg...
Question 64: Which of the following is the correct order of components in...
Question 65: A research facility is expecting to see an exponential incre...
Question 66: A technician is planning an equipement installation into a r...
Question 67: A company recently implemented a videoconferencing system th...
Question 68: A group of users cannot connect to network resources. The te...
Question 69: Which of the following network devices converts wireless sig...
Question 70: Which of the following could provide a lightweight and priva...
Question 71: A network administrator is developing a method of device mon...
Question 72: A network administrator is unable to ping a remote server fr...
Question 73: An organization has four departments that each need access t...
Question 74: A technician is implementing a new SD-WAN device with a defa...
Question 75: After a recent security awareness phishing campaign, the cyb...
Question 76: A network engineer configures a new switch and connects it t...
Question 77: A company is hosting a secure that requires all connections ...
Question 78: An IT department asks a newly hired employee to use a person...
Question 79: Which of the following should a company implement in order t...
Question 80: A medical clinic recently configured a guest wireless networ...
Question 81: A network administrator needs to change where the outside DN...
Question 82: Which of the following should be configured so users can aut...
Question 83: An ISP provided a company with a pre-configured modem and fi...
Question 84: Due to concerns around single points of failure, a company d...
Question 85: Users are unable to access files on their department share l...
Question 86: After a recent power outage, users are reporting performance...
Question 87: A technician needs to identify a computer on the network tha...
Question 88: A company is purchasing a 40Gbps broadband connection servic...
Question 89: Which of the following offers the ability to manage access a...
Question 90: Which of the following connectors allows a singular QSFP tra...
Question 91: A network administrator is in the process of installing 35 P...
Question 92: Which of the following is an XML-based security concept that...
Question 93: Which of the following are the best device-hardening techniq...
Question 94: A company has observed increased user traffic to gambling we...
Question 95: A network administrator notices uncommon communication betwe...
Question 96: Which of the following routing protocols uses an autonomous ...
Question 97: Which of the following network cables involves bounding ligh...
Question 98: A network technician is terminating a cable to a fiber patch...
Question 99: Which of the following can be implemented to add an addition...
Question 100: Which of the following must be implemented to securely conne...
Question 101: Which of the following will allow secure, remote access to i...
Question 102: Users cannot connect to an internal website with an IP addre...
Question 103: Which of the following is the best way to keep devices on du...
Question 104: Which of the following kinds of targeted attacks uses multip...
Question 105: A network engineer needs to deploy an access point at a remo...
Question 106: Which of the following is the next step to take after succes...
Question 107: Which of the following disaster recovery concepts is calcula...
Question 108: Users at a satellite office are experiencing issues when usi...
Question 109: A university is implementing a new campus wireless network. ...
Question 110: A network administrator is configuring a new switch and want...
Question 111: An administrator is setting up an SNMP server for use in the...
Question 112: A company wants to implement data loss prevention by restric...
Question 113: A network engineer runs ipconfig and notices that the defaul...
Question 114: Which of the following is the most cost-effective way to saf...
Question 115: A network administrator needs to fail over services to an of...
Question 116: Which of the following disaster recovery metrics is used to ...
Question 117: A user's VoIP phone and workstation are connected through an...
Question 118: A technician needs to set up a wireless connection that util...
Question 119: Which of the following routing technologies uses an attribut...
Question 120: Which of the following steps in the troubleshooting methodol...
Question 121: Which of the following protocols has a default administrativ...
Question 122: A network administrator is notified that a user cannot acces...
Question 123: After installing a new wireless access point, an engineer te...
Question 124: Which of the following connectors provides console access to...
Question 125: Which of the following steps in the troubleshooting methodol...
Question 126: A customer recently moved into a new office and notices that...
Question 127: Which of the following most likely requires the use of subin...
Question 128: Which of the following is the part of a disaster recovery (D...
Question 129: Which of the following allows a standard user to log in to m...
Question 130: An organizatin is struggling to get effective coverage using...
Question 131: A small business is deploying new phones, and some of the ph...
Question 132: A network administrator deployed wireless networking in the ...
Question 133: Which of the following most likely determines the size of a ...
Question 134: Which of the following protocol ports should be used to secu...
Question 135: Which of the following should an installer orient a port-sid...
Question 136: A client wants to increase overall security after a recent b...
Question 137: A network administrator has been monitoring the company's se...
Question 138: A secure communication link needs to be configured between d...
Question 139: A network technician is troubleshooting a faulty NIC and tes...
Question 140: Which of the following is created to illustrate the effectiv...
Question 141: A network administrator is configuring a network for a new s...
Question 142: Which of the following fiber connector types is the most lik...
Question 143: Which of the following OSI model layers can utilize a connec...
Question 144: A network administrator is reviewing a production web server...
Question 145: Which of the following attacks utilizes a network packet tha...
Question 146: A network administrator is implementing security zones for e...
Question 147: Which of the following devices can operate in multiple layer...
Question 148: A help desk technician receives a report that users cannot a...
Question 149: A network administrator wants to implement security zones in...
Question 150: A company is implementing a wireless solution in a high-dens...