Question 36
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
Question 37
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator Is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
Question 38
An ARP request is broadcasted and sends the following request.
''Who is 192.168.1.200? Tell 192.168.1.55''
At which of the following layers of the OSI model does this request operate?
''Who is 192.168.1.200? Tell 192.168.1.55''
At which of the following layers of the OSI model does this request operate?
Question 39
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
Question 40
A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information. Which of the following actions should the network technician take to prevent data loss?