Network+ pt3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors? A. A bad wire on the Cat 5e cable B. The wrong VLAN assignment to the switchport C. A misconfigured QoS setting on the router D. Both sides of the switch trunk set to full duplex

A. A bad wire on the Cat 5e cable

A network technician reviews an entry on the syslog server and discovers the following message from a switch: SPANNING-TREE Port 1/1 BLOCKEDWhich of the following describes the issue? A. A loop was discovered, and the impact was mitigated. B. An incorrectly pinned cable was disconnected. C. The link-local address on the port is incorrect. D. The port was shut down, and it needs to be reactivated.

A. A loop was discovered, and the impact was mitigated.

A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks needs to be completed to allow the phone to operate correctly? A. Assign the phone's switchport to the correct VLAN B. Statically assign the phone's gateway address. C. Configure a route on the VoIP network router. D. Implement a VoIP gateway

A. Assign the phone's switchport to the correct VLAN

Which of the following is considered a physical security detection device? A. Cameras B. Biometric readers C. Access control vestibules D. Locking racks

A. Cameras

An engineer recently decided to upgrade the firmware on a router. During the upgrade, the help desk received calls about a network outage, and a critical ticket was opened. The network manager would like to create a policy to prevent this from happening in the future. Which of the following documents should the manager create? A. Change management B. incident response C. Standard operating procedure D. System life cycle

A. Change management

A new company recently moved into an empty office space Within days, users in the next office began noticing increased latency and packet drops with their Wi-Fi-connected devices. Which of the following is the MOST likely reason for this issue? A. Channel overlap B. Distance from the AP C. Bandwidth latency D. RF attenuation E. Network congestion

A. Channel overlap

Which of the following is used to provide disaster recovery capabilities to spin up an critical devices using internet resources? A. Cloud site B. Hot site C. Cold site D. Warm site

A. Cloud site

A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers? A. Coaxial over Ethernet B. Internet Small Computer Systems Interface C. Fibre Channel D. Gigabit interface converter

A. Coaxial over Ethernet

A company wants to add a local redundant data center to its network in case of failure at its primary location. Which of the following would give the LEAST amount of redundancy for the company's network? A. Cold site B. Hot site C. Cloud site D. Warm site

A. Cold site

A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing an APlPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interlace has connectivity. Which of the following is MOST likely the issue the workstation is experiencing? A. DHCP exhaustion B. A rogue DHCP server C. A DNS server outage D. An incorrect subnet mask

A. DHCP exhaustion

A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting? A. Detection B. Recovery C. Identification D. Prevention

A. Detection

A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise Each team member has been assigned an area to trouble shoot. Which of the following approaches is being used? A. Divide-and-conquer B. Top-to-bottom C. Bottom-to-top D. Determine if anything changed

A. Divide-and-conquer

A malicious user is using special software 10 perform an on-path attack. Which of the following best practices should be configured to mitigate this threat? A. Dynamic ARP inspection B. Role-based access C. Control plane policing D. MAC filtering

A. Dynamic ARP inspection

A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue? A. Enable IGMP snooping on the switches. B. Implement another DHCP server. C. Reconfigure port tagging for the video traffic. D. Change the SSID of the APs

A. Enable IGMP snooping on the switches.

Which of the following can be used to decrease latency during periods of high utilization of a firewall? A. Hot site B. NIC teaming C. HA pair D. VRRP

A. Hot site

Which of the following BEST describes hosting several businesses on the same physical infrastructure? A. Hybrid B. Elasticity C. laaS D. Multitenancy

A. Hybrid

Which of the following is a benefit of the spine-and-leaf network topology? A. Increased network security B. Stable network latency C. Simplified network management D. Eliminated need for inter-VLAN routing

A. Increased network security

A security engineer is installing a new IOS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do? A. Install a network tap for the IDS B. Configure ACLs to route traffic to the IDS. C. Install an additional NIC into the IDS D. Install a loopback adapter for the IDS. E. Add an additional route on the router for the IDS.

A. Install a network tap for the IDS

A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal? A. Link aggregation B. Jumbo frames C. Port security D. Flow control E. Lower FTP port

A. Link aggregation

A Fortune 500 firm is deciding On the kind or data center equipment to install given its five-year budget Outlook. The Chief Information comparing equipment based on the life expectancy Of different models. Which Of the following concepts BEST represents this metric? A. MTBF B. MTRR C. RPO D. RTO

A. MTBF

An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating? A. Management information bases B. System baseline C. Network device logs D. SNMP traps

A. Management information bases

Which of the following topologies requites the MOST connections when designing a network? A. Mesh B. Star C. Bus D. Ring

A. Mesh

A company joins a bank's financial network and establishes a connection to the clearinghouse servers in the range 192 168.124.0/27. An IT technician then realizes the range exists within the VM pool at the data center. Which of the following is the BEST way for the technician to connect to the bank's servers? A. NAT B. PAT C. CIDR D. SLAAC

A. NAT

Which of the following options represents the participating computers in a network? A. Nodes B. CPUs C. Servers D. Clients

A. Nodes

A user reports that a new VoIP phone works properly but the computer that is connected to the phone cannot access any network resources. Which of the following MOST Likely needs to be configured correctly to provide network connectivity to the computer? A. Port duplex settings B. Port aggregationC. ARP settings D. VLAN tags E. MDIX settings

A. Port duplex settings

A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive? A. RST B. FIN C. ICMP Time Exceeded D. Redirect

A. RST

An administrator would like to allow Windows clients from outside me office to access workstations without using third-party software. Which or the following access methods would meet this requirement? A. Remote desktop gateway B. Spit tunnel C. Site-to-site VPN D. VNC

A. Remote desktop gateway

Which of the following is the primary function of the core layer of the three-tiered model? A. Routing B. Repeating C. Bridging D. Switching

A. Routing

Users in a branch can access an ln-house database server, but II is taking too long to fetch records. The analyst does not know whether the Issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. SNMP B. Link state C. Syslog D. QoS E. Traffic shaping

A. SNMP

Which of the following records can be used to track the number of changes on a DNS zone? A. SOA B. SRV C. PTR D. NS

A. SOA

A network administrator is setting up a new phone system and needs to define the location where VoIP phones can download configuration files. Which of the following DHCP services can be used to accomplish this task? A. Scope options B. Exclusion ranges C. Lease time D. Relay

A. Scope options

A technician is consolidating a topology with multiple SSlDs into one unique SSiD deployment. Which of the following features will be possible after this new configuration? A. Seamless roaming B. Basic service set C. WPA D. MU-MIMO

A. Seamless roaming

A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project? A. Single-mode B. Coaxial C. Cat 6a D. Twinaxial

A. Single-mode

Users are reporting intermittent Wi-Fi connectivity in specific parts of a building. Which of the following should the network administrator check FIRST when troubleshooting this issue? (Select TWO). A. Site survey B. EIRP C. AP placement D. Captive portal E. SSID assignment F. AP association time

A. Site survey C. AP placement

A Network engineer is investigating issues on a Layer 2 Switch. The department typically snares a Switchport during meetings for presentations, but atter the first user Shares, no Other users can connect. Which Of the following is MOST likely related to this issue? A. Spanning Tree Protocol is enabled on the switch. B. VLAN trunking is enabled on the switch. C. Port security is configured on the switch. D. Dynamic ARP inspection is configured on the switch.

A. Spanning Tree Protocol is enabled on the switch.

A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch.The technician observes the following configuration output from the switch: 1/1. client pc. connected. full. 1000 1/2. client pc. connected. full. 1000 1/3 client pc. connected. full. 10 Which of the following is a cause of the issue on port 1/3? A. Speed B. Duplex C. Errors D. VLAN

A. Speed

Which of the Mowing architectures reduces network latency by enforcing a limit on the number of switching devices on the frame's path between any internal hosts? A. Spine and leaf B. Software-defined network C. Three-tiered D. Collapsed core

A. Spine and leaf

Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs? A. Split tunnel B. Full tunnel C. Site-to-site tunnel D. Virtual desktop

A. Split tunnel

A network administrator is getting reports of some internal users who cannot connect to network resources. The users slate they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks. Which of the following is the MOST likely cause of the issue? A. The client DHCP scope is fully utilized B. The wired network is experiencing electrical interference C. The captive portal is down and needs to be restarted D. SNMP traps are being received E. The packet counter on the router interface is high.

A. The client DHCP scope is fully utilized

A network administrator is reviewing the following metrics from a network management system regarding a switchport.The administrator suspects an issue because users are calling in regards to the switchport's performance: Metric. Value Uptime. 201 days MDIX. On CRCs. 0 Giants 2508 Output queue maximum 40 packet input 136208849 packet output 64458087024 Based on the information in the chart above, which of the following fs the cause of these performance issues? A. The connected device is exceeding the configured MTU. B. The connected device is sending too many packets C. The switchport has been up for too longD. The connected device is receiving too many packets. E. The switchport does not have enough CRCs

A. The connected device is exceeding the configured MTU.

A network engineer needs to pass both data and telephony on an access port. Which or the following features should be configured to meet this requirement? A. VLAN B. VoIP C. VIP D. VRRP

A. VLAN

Which of the following would be the BEST choice to connect branch sites to a main office securely? A. VPN headend B. Proxy server C. Bridge D. Load balancer

A. VPN headend

A network administrator is trying to add network redundancy for the server farm. Which of the following can the network administrator configure to BEST provide this capability? A. VRRP B. DNS C. UPS D. RPO

A. VRRP

A network administrator needs to run a single command-line tool capable of displaying routing table and multicast memberships. Which of the following would BEST help the administrator achieve the requirements? A. arp B. show route C. show config D. netstate

A. arp

A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified m the SLA. Which of the following would BEST help measure the throughput? A. iPerf B. Ping C. NetFlow D. Netstat

A. iPerf

A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line? A. netstat B. netstat -a C. netstat —e D. netstat —n

A. netstat

A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting.Which of the following commands is the network administrator using? (Select TWO.) A. tcpdump B. show config C. hostname D. show route E. netstate F. show ip arp

A. tcpdump E. netstate

A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks. Which of the following would be BEST for the administrator to purchase? A. An IPS B. A Layer 3 switch C. A router D. A wireless LAN controller

B. A Layer 3 switch

A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Select TWO). A. Data loss prevention policy B. BYOD policy C. Acceptable use policy D. Non-disclosure agreement E. Disaster recovery plan F. Physical network diagram

B. BYOD policy F. Physical network diagram

The following DHCP scope was configured for a new VLAN dedicated to a large deployment of 325 loT sensors: DHCP network scope:10.10.0.0/24 Exclusion range: 10.10.10.1-10.10.10.10 Gateway: 10.10.0.1 DNS: 10.10.0.2 DHCP options 66(TFTP): 10.10.0.4 DHCP option 4(NTP): 10.10.0.5 The first 244 loT sensors were able to connect to the TFTP server, download the configuration file, and register to an loT management system. The other sensors are being shown as offline. Which of the following should be performed to determine the MOST likely cause of the partial deployment of the sensors? A. Check the gateway connectivity to the TFTP server. B. Check the DHCP network scope. C. Check whether the NTP server is online. D. Check the loT devices for a hardware failure.

B. Check the DHCP network scope.

A technician knows the MAC address of a device and is attempting to find the device's IP address. Which of the following should the technician look at to find the IP address? (Select TWO). A. ARP table B. DHCP leases C. IP route table D. DNS cache E. MAC address table F. STP topology

B. DHCP leases E. MAC address table

While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), although it is connected to a gigabit switch.While reviewing the interface information in the switch CLI, the technician notes the port is operating at IOOFD but Shows many RX and TX errors. The technician moves the computer to another switchport and experiences the same issues. Which of the following is MOST likely the cause of the low data rate and port errors? A. Bad switch ports B. Duplex issues C. Cable length D. Incorrect pinout

B. Duplex issues

A network administrator needs to provide evidence to confirm that recent network outages were caused by increased traffic generated by a recently released application. Which of the following actions will BEST support the administrator's response? A. Generate a network baseline report for comparison. B. Export the firewall traffic logs. C. Collect the router's NetFlow data. D. Plot interface statistics for dropped packets.

B. Export the firewall traffic logs.

A company is deploying a SAN at headquarters and a branch office 1, 000ml (1,609km) away that w« access small amounts of data. Which of the following types of connections would be MOST cost effective to implement? A. ISCSI B. FCoE C. Ethernet D. FC

B. FCoE

An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the Mowing sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF? A. Temperature B. Humidity C. Smoke D. Electrical

B. Humidity

A technician discovered that some information on the local database server was changed during a tile transfer to a remote server. Which of the following should concern the technician the MOST? A. Confidentiality B. Integrity C. DDoS D. On-path attack

B. Integrity

Which of the following network devices can perform routing between VLANs? A. Layer 2 switch B. Layer 3 switch C. Load balancer D. Bridge

B. Layer 3 switch

Which of the following is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices? A. Twisted cable with a minimum Cat 5e certification B. Multimode fiber with an SC connector C. Twinaxial cabling using an F-type connector D. Cable termination using TIA/EIA-568-B

B. Multimode fiber with an SC connector

To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device.Which of the Mowing can be configured to fulfill this requirement? A. QoS traffic classification B. Port mirroring C. Flow control D. Link Aggregation Control Protocol

B. Port mirroring

Which of the following describes the BEST device to configure as a DHCP relay? A. Bridge B. Router C. Layer 2 switch D. Hub

B. Router

Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?A. Elastic computing B. Scalable networking C. Hybrid deployment D. Multitenant hosting

B. Scalable networking

A network technician was hired to harden the security of a network. The technician is required to enable encryption and create a password for AP security through the web browser. Which of the following would BEST support these requirements? A. ESP B. WPA2 C. IPSec D. ACL

B. WPA2

When accessing corporate network resources, users are required to authenticate to each application they try to access.Which of the following concepts does this BEST represent? A. SSO B. Zero Trust C. VPN D. Role-based access control

B. Zero Trust

A network engineer needs to create a subnet that has the capacity for five VLANs. with the following number of clients lo be allowed on each: VLAN10 50 users VLAN20 35 users VLAN30 20 users VLAN40 75 users VLAN50 130 users Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future? A. 10.0.0.0/21 B. 10.0.0.0/22 C. 10.0.0.0/23 D. 10.0.0.0/24

C. 10.0.0.0/23

Which of the following ports are associated with IMAP? (Choose two.) A. 25 B. 110 C. 143 D. 587 E. 993 F. 995

C. 143 E. 993

A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network? A. 80.87.78 0 - 80.87.78.14 B. 80.87.78 0 - 80.87.78.110 C. 80.87.78 1 - 80.87.78.62 D. 80.87.78.1 - 80.87.78.158

C. 80.87.78 1 - 80.87.78.62

Users attending security training at work are advised not to use single words as passwords for corporate applications. Which of the following does this BEST protect against? A. An on-path attack B. A brute-force attack C. A dictionary attack D. MAC spoofingE. Denial of service

C. A dictionary attack

A technician is monitoring a network interface and notices the device is dropping packets. The cable and interfaces, however, are in working order. Which of the following is MOST likely the cause? A. OID duplication B. MIB mismatch C. CPU usage D. Encapsulation errors

C. CPU usage

A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket • The server's IP address can be pinged from the client PCs, • Access to the web resource works correctly when on the server's console. • No clients can access the servers data via URL.• The server does not have a firewall configured• No ACLs are preventing connectivity from the client's network. • All services on the server are operating normally, which was confirmed by the server team. Which of the following actions will resolve the issue? A. Reset port security on the switchport connecting the server. B. Adjust the web server's NTP settings to match the client settings. C. Configure A records for the web server. D. Install the correct MIB on the web server

C. Configure A records for the web server.

A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing? A. Disabling unneeded switchports B. Changing the default VLAN C. Configuring DHCP snooping D. Writing ACLs to prevent access to the switch

C. Configuring DHCP snooping

A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance? The safer , easier way to help you pass any IT exams. A. Add another AP. B. Disable the 2.4GHz radios. C. Enable channel bonding. D. Upgrade to WiFi 5.

C. Enable channel bonding.

Which of the following would be the MOST cost-effective recovery solution for a company's lower- priority applications? A. Warm site B. Cloud site C. Hot site D. Cold site

C. Hot site

An administrator needs to connect two laptops directly to each other using 802.11ac but does not have an AP available. Which of the following describes this configuration? A. Basic service set B. Extended service set C. Independent basic service set D. MU-MIMO

C. Independent basic service set

A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue? A. Run the show interface command on the switch B. Run the tracerouute command on the server C. Run iperf on the technician's desktop D. Ping the client's computer from the router E. Run a port scanner on the client's IP address

C. Run iperf on the technician's desktop

A network administrator is testing performance improvements by configuring channel bonding on an 802.Hac AP. Although a site survey detected the majority of the 5GHz frequency spectrum was idle, being used only by the company's WLAN and a nearby government radio system, the AP is not allowing the administrator to manually configure a large portion of the 5GHz frequency range. Which of the following would be BEST to configure for the WLAN being tested? A. Upgrade the equipment to an AP that supports manual configuration of the ElRP power settings. B. Switch to 802.11n. disable channel auto-selection, and enforce channel bonding on the configuration. C. Set up the AP to perform a dynamic selection of the frequency according to regulatory requirements. D. Deactivate the band 5GHz to avoid Interference with the government radio

C. Set up the AP to perform a dynamic selection of the frequency according to regulatory requirements.

Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter? (Choose two.) A. iSCSI B. FCoE C. Three-tiered network D. Spine and leafE. Top-of-rack switching

C. Three-tiered network D. Spine and leafE. Top-of-rack

Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops? A. Traffic shaping B. Traffic policing C. Traffic marking D. Traffic classification

C. Traffic marking

A large metropolitan city is looking to standardize the ability tor police department laptops to connect to the city government's VPN. The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city's needs? A. 5G B. LTE C. Wi-Fi 4 D. Wi-Fi 5 E. Wi-Fi 6

C. Wi-Fi 4

A technician is documenting an application that is installed on a server and needs to verify all existing web and database connections to the server. Which of the following tools should the technician use to accomplish this task? A. tracert B. ipconfig C. netstat D. nslookup

C. netstat

A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue? A. ipconfig B. netstat C. tracert D. ping

C. tracert

An international company is transferring its IT assets including a number of WAPs from the United States to an office in Europe for deployment. Which of the following considerations should the company research before Implementing the wireless hardware? A. WPA2 cipher B. Regulatory Impacts C. CDMA configuration D. 802.11 standards

D. 802.11 standards

Which of the following fouling protocols is generally used by major ISPs for handing large-scale internet traffic? A. RIP B. EIGRP C. OSPF D. BGP

D. BGP

A network administrator is decommissioning a server. Which of the following will the network administrator MOST likely consult? A. Onboarding and off boarding policies B. Business continuity plan C. Password requirements D. Change management documentation

D. Change management documentation

A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients. Which of the following should a technician configure? A. Automate a continuous backup and restore process of the system's state of the active gateway. B. Use a static assignment of the gateway IP address on the network clients. C. Configure DHCP relay and allow clients to receive a new IP setting. D. Configure a shared VIP and deploy VRRP on the routers.

D. Configure a shared VIP and deploy VRRP on the routers.

A network technician is selecting a replacement for a damaged fiber cable that goes directly to an SFP transceiver on a network switch. Which of the following cable connectors should be used? A. RJ45 B. LC C. MT D. F-type

D. F-type

Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cawing? A. RJ11 B. LC ports C. Patch panel D. F-type connector

D. F-type connector

A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of me connectivity failure? A. Incorrect VLAN B. DNS failure C. DHCP scope exhausting D. Incorrect gateway

D. Incorrect gateway

Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns? A. Changing the VLAN of the web server B. Changing the server's IP address C. Implementing an ACL D. Instating a rule on the firewall connected to the web server

D. Instating a rule on the firewall connected to the web server

Which of the following devices have the capability to allow communication between two different subnetworks? (Select TWO). A. IDS B. Access point C. Layer 2 switch D. Layer 3 switch E. Router F. Media converter

D. Layer 3 switch E. Router

At which of the following OSI model layers does an IMAP client run? A. Layer 2 B. Layer 4 C. Layer 6 D. Layer 7

D. Layer 7

During a risk assessment which of the following should be considered when planning to mitigate high CPU utilization of a firewall? A. Recovery time objective B. Uninterruptible power supply C. NIC teaming D. Load balancing

D. Load balancing

At which of the following OSI model layers does routing occur? A. Data link B. Transport C. Physical D. Network

D. Network

Which of the following OSI model layers contains IP headers? A. Presentation B. Application C. Data link D. Network E. Transport

D. Network

A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements? A. FTP B. TFTP C. SMTP D. SFTP

D. SFTP

A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use? A. Network access control B. Least privilege C. Multifactor authentication D. Separation of duties

D. Separation of duties

A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1 connecting to 10.1.200.1 . . . Could not open connection to the host on port 23: connect fail Which of the following is the MOST likely cause for the failure? A. The network engineer is using the wrong protocol B. The network engineer does not have permission to configure the device C. SNMP has been secured with an ACL D. The switchport the engineer is trying to configure is down

D. The switchport the engineer is trying to configure is down

Which of the following is conducted frequently to maintain an updated list of a system's weaknesses?A. Penetration test B. Posture assessment C. Risk assessment D. Vulnerability scan

D. Vulnerability scan

To access production applications and data, developers must first connect remotely to a different server From there, the developers are able to access production data. Which of the following does this BEST represent? A. A management plane B. A proxy server C. An out-of-band management device D. A site-to-site VPN E. A jump box

E. A jump box

A technician is assisting a user who cannot access network resources when the workstation is connected to a VoIP phone. The technician identifies the phone as faulty and replaces it. According to troubleshooting methodology, which of the following should the technician do NEXT? A. Implement the solution. B. Test the theory. C. Duplicate the issue. D. Document the findings. E. Verify functionality.

E. Verify functionality.


Kaugnay na mga set ng pag-aaral

guó jiā Países Idioma (español-pinyin)

View Set

CH 18 Global Climate Change SCI 1102

View Set

Chapter 10 Exam Questions Part II

View Set

Chapter 16- Outcome Identification and Planning

View Set

Strategies for Health Education Final

View Set