pain

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You've recently installed a new Windows server. To ensure system time accuracy, you've loaded an application that synchronizes the hardware clock on the server with an external time source on the Internet. Now you must configure your network firewall to allow time synchronization traffic through.Which of the following ports are you MOST likely to open on the firewall?

123

During a network expansion, a network administrator decides to segment the corporate network into two subnets to improve management and security. The first subnet is configured with a network address of 192.168.10.0/24, and the second subnet with a network address of 192.168.20.0/24. A router is used to connect these two subnets and also provides a connection to the Internet. The router's interface on the first subnet is assigned an IP address of 192.168.10.1, and on the second subnet, an IP address of 192.168.20.1. If a computer in the first subnet (192.168.10.25) needs to communicate with a server in the second subnet (192.168.20.50), what should be set as the computer's default gateway?

192.168.10.1

A network engineer is tasked with designing a network for a new office building. The building will have 5 different floors, with each floor requiring its own subnet. The IP range allocated for the building is 10.0.0.0/22. The engineer wants to ensure that each floor can support up to 200 devices. What is the minimum subnet mask the engineer can use for each floor's subnet to meet this requirement?

255.255.255.0

You are a network administrator for a large corporation. Recently, you've noticed that after a power outage, several network devices did not recover their previous configurations, leading to network instability and downtime. Upon investigation, you discover that the running configurations were not saved as the startup configurations on these devices. To prevent this issue from recurring, what should you implement?

A policy that requires all changes to be saved as both running and startup configurations

What is the MOST likely cause of clients ending up with an incorrect IP configuration?

A rogue DHCP server on the network

You are designing a network that requires long-distance data transmission between two buildings located several kilometers apart. You decide to use single mode fiber for its ability to support long-distance transmissions. Which type of transceiver should you select for this application?

A transceiver that uses laser diodes

A rapidly growing tech startup is preparing to move its operations to a larger office space to accommodate its expanding team. The new office will have a significantly larger number of employees connecting to the network, including a mix of in-office and remote workers. The startup's IT team is tasked with ensuring that the network infrastructure supports seamless connectivity, robust security for sensitive data, and efficient management of internet traffic.Considering these requirements, what aspect of an edge router should the IT team focus on when selecting a device for their new office?

Ability to support a high number of simultaneous VPN connections

During a wireless survey, you notice that the signal strength is excellent near the access points but drops significantly in the corners of the office. What is the MOST likely solution to this problem?

Add additional access points or use booster antennas in areas with weak signal.

You manage a network that's connected using a physical star topology. One of the drop cables connecting a workstation has been removed. Which of the following BEST describes the effect that this will have on network communications?

All devices except the device connected with the drop cable will be able to communicate.

You are a network administrator tasked with configuring a new firewall for your company's internal network. The network includes various departments, such as HR, Finance, and IT, each with its own VLAN. The company policy requires that the HR department should only be able to access the internet for HR-related cloud services and should not have access to the Finance department's resources. You decide to implement ACLs on the firewall to meet these requirements. Which of the following ACL configurations would BEST meet the company's policy requirements?

Allow only HTTP and HTTPS traffic from the HR VLAN to the Internet; block all traffic from the HR VLAN to the Finance VLAN

A global company is deploying a new web application that requires high availability and low latency for users worldwide. The company plans to host the application on several servers located in different geographic regions. To ensure users are automatically directed to the nearest server for the fastest response times, which IP addressing scheme should the company implement to BEST meet their requirements?

Anycast

our organization has recently expanded its operations and now requires a failover Internet connection for redundancy. The network team plans to connect to the Internet via two different ISPs. To manage this setup efficiently and ensure that your network can communicate with the rest of the Internet through either ISP, you are considering implementing a specific routing protocol on your edge routers. Which routing protocol should you implement on your edge routers to manage connectivity through multiple

BGP

You are a network administrator for a medium-sized company. Recently, you've noticed an increase in suspicious network activity. To enhance your network's security, you decide to implement an Intrusion Detection System (IDS).

Behind the network firewall to monitor internal and external traffic

A newly deployed stack with servers, network switches, a KVM (Key, Video, Mouse), storage unit, and uninterruptible power supplies has just been fully cabled. After powering on the stack, there seems to be a network connectivity issue between the switch and servers. What is the best approach when trying to resolve this type of network issue?

Bottom-to-top

How can DNS record updates be propagated more quickly?

By reducing the TTL value before the change

A small software development company, DevSoft, decides to transition from using certificates issued by external Certificate Authorities (CAs) to using self-signed certificates for its internal testing environments. The decision is made to reduce costs and simplify the process for setting up new testing environments.What are the potential risks or drawbacks associated with DevSoft's decision to use self-signed certificates for its internal testing environments?

Challenges in ensuring the authenticity and integrity of the testing environments

A network engineer is tasked with analyzing the performance of an existing EIGRP-configured network that connects several branch offices to a central data center. Recently, users at one of the branch offices have been experiencing delays when accessing applications hosted in the data center. The network consists of multiple paths with varying bandwidths and delays. What analysis approach should the network engineer take to identify the cause of the application access delays?

Check the bandwidth and delay metrics for the paths from the affected branch office to the data center.

An educational institution is planning to segment its network into three major sections: Administrative, Academic, and Student Residential. Each section requires a different number of IP addresses: Administrative needs up to 500 addresses, Academic needs up to 10,000 addresses, and Student Residential needs up to 2,000 addresses. Using classful addressing, which class of IP addresses would be most appropriate for the Academic section?

Class B

You are troubleshooting a newly installed VoIP phone at a client's site. The client complains that the voice quality is poor and there are frequent dropouts during calls. You suspect that the issue might be related to the network configuration. What should you do first to diagnose and potentially fix the issue?

Conduct an echo test call to verify basic connectivity and assess voice quality.

A network engineer is configuring a new segment in their company's network. They need to ensure that packets destined for the Internet are correctly forwarded through the company's gateway router. After setting up the configurations, they notice that only packets to local destinations are successfully delivered, while packets intended for the Internet are not. What is the MOST likely configuration the engineer needs to verify or add?

Configure a default route pointing to the gateway router.

You are setting up a new office network that requires high-speed connectivity and the ability to segment the network into different departments for security and traffic management purposes. You have decided to use switches as the primary networking devices. Which of the following configurations should you implement to meet these requirements?

Configure each department on a separate VLAN within the switch.

You are a network administrator tasked with setting up a new router for your company's branch office. You need to configure the router before it can be connected to the company's network. You have a laptop with terminal emulator software installed. Which of the following methods should you use to initially configure the router?

Connect your laptop to the router's console port using a console cable and configure it through the terminal emulator.

You are configuring a new web server for your company, which will host the company's main website. The server has an IPv4 address of 192.168.1.5. You want the website to be accessible through both www.company.com and company.com. Which of the following DNS record configurations would BEST achieve this goal?

Create an A record for company.com pointing to 192.168.1.5 and a CNAME record for www.company.com aliasing company.com.

You are concerned about the privacy of your DNS queries and want to ensure they cannot be easily intercepted or read by others on the network. Which of the following protocols should you use?

DNS over HTTPS (DoH)

You are a network administrator tasked with configuring a new network that includes several switches. You've decided to use Spanning Tree Protocol (STP) to prevent network loops. One of the switches is connected to the network's high-bandwidth backbone, and you want to ensure this switch is elected as the root bridge. Which of the following actions should you take?

Decrease the priority value of the switch connected to the high-bandwidth backbone.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having issues. Which of the following configuration values would you MOST likely need to change?

Default gateway

A network administrator notices an unusual spike in network traffic and a significant slowdown in network performance. Upon investigation, the administrator discovers that multiple IP addresses are sending a large volume of requests to a single server within her network. The server is responsible for handling email services, and due to the overwhelming amount of requests, legitimate emails are being delayed, and users are experiencing significant disruptions. What type of attack is most likely occurring in this scenario?

Denial of Service (DoS) attack

Your company plans to deploy a new web application that will be accessible to the public. The IT department suggests using a screened subnet for enhanced security. The application requires a public-facing web server and a database server that should not be directly accessible from the Internet. Which of the following configurations would BEST suit the company's needs?

Deploy two firewalls, placing the web server in the perimeter network and the database server in the internal network, with no direct internet access to the database server.

you are a support technician at a medium-sized company. One morning, you receive a call from a user in the accounting department who reports that their financial reporting software, which has been running smoothly for months, suddenly won't start. You remember that the software received an update over the weekend.Based on this scenario, which of the following actions would be most appropriate to take first in order to identify the cause of the problem?

Determine what changes have occurred since the software was last working, specifically asking about the recent update.

An IT security specialist is conducting an audit of their company's network devices. The specialist discovers that several unused services, including Telnet and FTP, are enabled on some devices.

Disable the unused services to reduce the attack surface.

You are the IT manager for a medium-sized company. Your server room is located in a region where freezing temperatures are common during the winter. You need to install a fire suppression system that minimizes the risk of water damage to your servers while also ensuring the system is effective in freezing conditions. Which type of fire suppression system should you choose?

Dry-pipe system

An organization wants to enhance its network security to prevent on-path attacks, specifically targeting ARP spoofing techniques. Which of the following measures would be most effective?

Enabling Dynamic ARP Inspection (DAI) on switches

An IT security specialist receives reports from several employees that their devices are spontaneously disconnecting from the company's wireless network and struggling to reconnect. Suspecting a potential attack, the security specialist analyzes the situation and notices an unknown access point with a similar SSID to the company's network. What type of attack is most likely occurring?

Evil twin attack

A telecommunications company is planning to upgrade its network infrastructure in a suburban area. The company wants to provide high-speed internet access but must consider the existing copper wiring infrastructure and the cost implications of completely replacing it. They are debating between implementing a Fiber to the Curb (FTTC) solution and a Fiber to the Premises (FTTP) solution. The area consists of single-family homes spread out over a large area, each approximately 300 meters from the local point of presence. Which solution should the company choose to balance high-speed access with cost considerations?

FTTC with VDSL

A data center is planning to upgrade its storage network to improve data transfer speeds and efficiency. The team is considering implementing a Fibre Channel SAN due to its high performance.Which of the following would be a critical component to include in their upgrade for connecting servers to the SAN?

Fibre Channel Host Bus Adapter (HBA)

A network engineer is tasked with designing a network infrastructure for a new office located in an industrial area. The office is situated close to several manufacturing plants, which are known to generate significant electromagnetic interference (EMI). The network will support critical data transfers and VoIP services. Given the environmental conditions and the need for reliable, high-speed data transmission, which type of twisted pair cabling should the engineer choose?

Fully Shielded Twisted Pair (S/FTP)

A university's IT department is facing challenges with its campus-wide Wi-Fi network. During peak hours, students and faculty experience slow internet speeds and intermittent connectivity issues. The IT department decides to investigate the network traffic to identify the cause of these issues. They plan to use a technology that can provide detailed information about network traffic flows without imposing a heavy processing overhead on the network infrastructure. Which technology should the university's IT department use to investigate the network traffic flows efficiently?

IPFIX

A user reports that they are receiving a warning about a duplicate IP address on their Windows machine. What steps should you take to resolve this issue?

Identify the devices involved by using ping and arp -a commands, then reconfigure one of the devices to use a unique IP address.

As part of your duties in the IT department, you are reviewing the software licenses for the company's servers. You notice that one of the servers is running a critical application under a trial license that is about to expire. The expiration of this trial license could severely impact the company's operations. What is the most appropriate action to take in this situation?

Immediately purchase a full license for the application.

During a network audit, it is discovered that a significant amount of IP fragmentation is occurring, leading to performance issues. The network uses both IPv4 and IPv6 protocols. The network team decides to implement a solution to minimize fragmentation.

Implement path MTU discovery across the network.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following:

Incorrect IP address

You manage a local area network with several switches. A new employee has started today, so you connect her workstation to a switch port. After connecting the workstation, you find that it can't get an IP address from the DHCP server. You check the link and status lights and see that the connection is working properly. A ping to the workstation's loopback address succeeds. No other computers seem to have the problem. Which of the following is the MOST likely cause of the problem?

Incorrect VLAN assignment

You are reviewing the installation of structured cabling in a new data center. The cables are neatly bundled and labeled at both ends. However, you notice that the service loops are very tight, with almost no extra cable at the patch panels. What could be the consequence of this practice?

Increased risk of cable damage and connectivity issues when adjustments are needed

During a routine network upgrade, a junior network technician accidentally connects two ports on the same switch with a patch cable, creating a potential for a network loop. The next day, employees start complaining about slow internet speeds and intermittent disconnections. As the senior network administrator, you are tasked with resolving the issue.

Inspect the physical connections on the switches for any improper configurations that could have introduced a loop.

A company has recently expanded its office space, requiring the network to be extended. The new network segment includes running cables next to a newly installed machinery area, where several large machines operate continuously. After the expansion, there are reports of erratic network behavior, including dropped connections and data corruption. What step should be taken first to address these network issues?

Install shielded Ethernet cables to mitigate the interference from the machinery.

A network engineer is troubleshooting connectivity issues on a local area network (LAN). During the investigation, the engineer captures a packet with a destination MAC address of 01:00:5E:00:00:FB. The engineer needs to determine the nature of this packet to proceed with the troubleshooting process. Based on the destination MAC address, what can the engineer infer about the packet?

It is a multicast packet intended for a group of devices on the network.

You are a network administrator who is configuring a Windows Server for your organization. You want to ensure that the server uses the most secure and recommended system for network authentication, especially for services accessed by users within the organization's network. Which authentication system should you configure to achieve this goal?

Kerberos

A network engineer is analyzing the OSPF setup in a multi-area OSPF network for a large enterprise. The network consists of several departments, each configured as a separate OSPF area, and all connected through a central backbone area (Area 0). The engineer notices that some of the departments are experiencing slow convergence times after a network change. What could be the reason for the slow convergence times in these departments?

Link State Advertisements (LSAs) are not being propagated efficiently within the affected areas.

When trying to access the website www.example.org, which DNS server type is contacted first to begin the process of resolving the website's IP address?

Local DNS server

Your network is experiencing intermittent audio and video issues during VoIP calls, such as echo and delays. After conducting a network analysis, you notice that packets are arriving out of sequence and some are getting lost. Which of the following is most likely causing these issues?

Packet loss and jitter

Your company has recently expanded, and you've been tasked with designing the network infrastructure for the new office space. The office will host 50 workstations, each requiring a wired connection to the network for reliability and speed. You've run Ethernet cables from each workstation to the central networking room. To ensure a scalable and manageable network, you decide to use a device that allows for easy reconfiguration of network connections as the company grows and changes. Considering the need for scalability and ease of management, which device is MOST critical in your network design for terminating the Ethernet cables from the workstations?

Patch Panel

Which of the following is the BEST approach when a configuration has drifted from its baseline?

Perform testing to determine whether to revert.

A software developer is working at a coffee shop when a friendly stranger strikes up a conversation about technology. During the chat, the stranger offers the developer a USB drive, claiming it contains a beta version of an innovative software tool that could be useful for their work. The software developer is tempted by the offer but recalls a recent security training session at their company. How should the software developer respond to the stranger's offer of the USB drive in the safest way possible?

Politely decline the offer, citing company policy.

A telecommunications company is upgrading its network to support 5G cellular data. The engineering team is tasked with choosing a time synchronization protocol that can meet the high precision requirements necessary for 5G technology. Which protocol should they choose?

Precision Time Protocol (PTP)

A network administrator is working on enhancing the privacy of devices on the company network. The administrator decides to implement a feature that uses pseudorandom numbers for the interface ID part of the IPv6 address. What feature is the network administrator implementing?

Privacy extensions

You are setting up a new data center for your company, which requires high-speed data transmission and the flexibility to connect devices using both fiber optic and copper cables. To achieve this, you decide to use modular transceivers in your network equipment. One of your primary goals is to ensure that the network can handle 40 Gigabit Ethernet (40 GbE) over fiber optic cables for connections between core switches and aggregation switches. Additionally, you want the capability to use copper cables for shorter, less critical connections without changing the physical hardware.

QSFP+ transceivers

You are setting up a small office network that requires wired Ethernet connections for multiple computers and devices. You need to ensure that all devices can communicate effectively over the network. Given the need for reliable and fast data transmission, you decide to use twisted pair cabling. Which type of connector should you use to terminate the Ethernet cables at both the devices and the network switch?

RJ45 connectors

During a routine inspection of your company's server room, you notice that several racks are equipped with lockable front and rear doors, but many of these doors are left open during business hours. Additionally, some racks have unused slots that are not covered with blanking plates. You are concerned that these practices may be affecting the server room's overall cooling efficiency. What would be the most effective recommendation to address these concerns?

Recommend the installation of blanking plates in all unused rack slots to improve airflow and cooling efficiency.

A company, Tech Innovations, plans to implement a secure internal communication system for its employees. The IT department suggests using digital certificates and PKI to ensure the confidentiality and integrity of the communications. They propose issuing digital certificates for each employee, which will be signed by the company's own Certificate Authority (CA).What are the primary benefits of Tech Innovations using its own CA to issue digital certificates for secure internal communication?

Reduced costs and increased control over the certificate lifecycle

A financial services company is transitioning to a Zero Trust Architecture (ZTA) for its corporate network. The IT department is configuring the system to ensure that all employees, regardless of their position or location, must have their identities and device security posture verified before accessing sensitive financial records. Which of the following approaches aligns BEST with the principles of ZTA?

Requiring multi-factor authentication (MFA) and continuous verification of device security posture for access to financial records

A network administrator is troubleshooting a connectivity issue in a network that uses the Routing Information Protocol (RIP). Router A is supposed to route traffic to the 10.0.3.0/24 network via Router B. However, traffic destined for 10.0.3.0/24 is not reaching its destination. The administrator notices that Router A recently received an update from Router C, which also advertises a route to 10.0.3.0/24 with a lower hop count than the route through Router B. What is the MOST likely reason for the connectivity issue?

Router A updated its routing table to use the route through Router C.

ngela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic, Angela discovers a high number of collisions. Which connectivity device would BEST reduce the number of collisions and allow future growth?

Switch

During a network upgrade, you decide to replace older Cat 5e cables with Cat 6 cables to support higher data rates. The new cables are installed along the same path as the old ones, which includes a 250-meter run from the server room to the far end of the building. After the upgrade, you notice that the network performance has not improved and, in some cases, has worsened. What is the most likely reason for this issue?

The 250-meter cable run exceeds the maximum length for optimal signal transmission, leading to attenuation.

A healthcare organization with multiple clinics and a central hospital is experiencing network bottlenecks and security concerns due to the increasing use of telehealth services and the need to access patient records securely from various locations. They are considering upgrading their network to an SD-WAN architecture.What key feature of SD-WAN would MOST directly address the healthcare organization's concerns about network bottlenecks and security?

The ability to prioritize traffic based on application needs

A network engineer is troubleshooting connectivity issues on a switch network. They discover that when a specific device sends a frame, the switch floods the frame out of all ports except the source port. What does this indicate about the destination MAC address in relation to the switch's MAC address table?

The destination MAC address is not found in the MAC address table.

You are troubleshooting a network issue where a remote server is not responding to your web application's requests. You decide to use the ping command to check the connectivity to the server. After running the command ping 192.168.1.10, you receive a series of "Reply from 192.168.1.10" messages with varying RTT times. What can you infer about the network condition based on this output?

The remote server is online, and there is a network path between her host and the server.

Your company has recently expanded its network by adding several new switches. After the expansion, you've noticed intermittent network outages and slow performance. Upon investigation, you discover that the root bridge of your Spanning Tree Protocol (STP) configuration is a switch located on the edge of the network, which is connected via a low-bandwidth link. What is the MOST likely cause of the network issues, and what action should you take to resolve them?

The root bridge is located on a low-bandwidth link, causing a bottleneck. You should decrease the priority value of a core switch to elect it as the new root bridge.

A small tech startup is setting up its first office network. The network design is straightforward, consisting of a single router connecting the office to the Internet and several switches connecting various departments within the office. The company plans to add a few remote workers in the near future, who will connect to the office network via VPN. The startup's primary concern is ensuring that data packets take the shortest path possible to minimize latency, especially for real-time applications like VoIP and video conferencing.Given these requirements, which characteristic should the startup prioritize when selecting a distance vector routing protocol for their network?

The route with the fewest hops

A network administrator is troubleshooting connectivity issues in a VLAN setup. A user on VLAN 30 reports that they cannot access the Internet, but they can communicate with other devices on the same VLAN.

The routing configuration between VLAN 30 and the network's gateway

You are monitoring network traffic and notice that ARP requests for a specific IP address are receiving responses from two different MAC addresses.What is the MOST likely cause of this issue, and how should you proceed to troubleshoot it?

There may be a duplicate MAC address issue; use a protocol analyzer to examine ARP traffic more closely.

A company is planning to enhance its IT infrastructure to improve the availability and reliability of its services. They are considering an active-active cluster configuration for their database servers to ensure that their online services can handle high traffic volumes and remain available even if one server fails. What is a critical consideration they should keep in mind for this setup?

They need to ensure that their system can handle the increased workload on the remaining server(s) in the event of a failover.

A network engineer is troubleshooting connectivity issues in a network and uses the traceroute command to diagnose the problem. The traceroute output shows that packets are being sent through an unexpected path that includes the same routers multiple times. What does this indicate, and what should the engineer check first?

This indicates a potential routing loop; the engineer should check the routing configurations on the involved routers.

A company is expanding its data center and wants to ensure high availability and fault tolerance for its storage network. The network design includes multiple paths between servers and storage devices. In the context of a Fibre Channel SAN, what is the purpose of designing a network with multiple paths?

To allow for load balancing and fault tolerance

As the IT manager for a small business, you've encountered an issue with an older model router that has been reliable until recently. The router has started to drop connections sporadically, causing disruptions in daily operations. After conducting an initial assessment, you've determined that the issue might be related to outdated firmware or a minor hardware malfunction. Given the limited IT budget and the critical need to maintain operations, you must decide whether to repair or replace the router. What is the MOST appropriate course of action?

Update the router's firmware and check for any loose internal connections that might be causing the issue.

During a security audit, it was discovered that an organization's network devices were configured with SNMP v2c, using default community strings. The auditor recommended enhancing the security of SNMP communications. What is the MOST effective measure the organization should take following this audit?

Upgrade to SNMP v3 and configure it with authPriv mode.

You manage a small cafe with a Wi-Fi network that still uses WEP encryption. You have noticed an increase in tech-savvy customers and want to upgrade your Wi-Fi security to prevent unauthorized access and data interception. Which encryption standard should you upgrade to for the best security?

Upgrade to WPA3

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

Use Syslog to send log entries to another server.

During a network audit, an IT manager discovers that some legacy devices in their organization only support IPv4, while the majority of the infrastructure is dual stack capable. The manager wants to ensure seamless communication within the network and with external IPv6 resources. What should the manager consider implementing to achieve this goal?

Use a tunneling mechanism for the legacy devices to communicate with external IPv6 resources.

You are a network administrator tasked with ensuring that all devices connected to your company's network are authorized and accounted for. You suspect that there might be unauthorized devices connected to the network. Which of the following actions would be most effective in identifying these potential rogue devices?

Use an IP scanner to perform host discovery across the network.

A multinational corporation operates in a highly regulated industry and uses cloud services to host its data processing operations. The company needs to ensure that data processing for each region complies with local laws and regulations. Additionally, the company wants to optimize network performance by reducing latency for users in different geographical locations.

Use cloud firewalls to create segmented networks for each region.

You are tasked with decommissioning a fleet of laptops that were used by your company's remote workforce. The laptops contain a mix of HDDs and SSDs. To ensure data security, you decide to use a method that is effective across both types of drives. Which method should you choose?

Utilize the Instant Secure Erase (ISE) feature on all drives.

Your company has recently expanded its network infrastructure to include a new subnet for its growing R&D department. To ensure high availability and redundancy for the network's first hop, you've been tasked with implementing a First Hop Redundancy Protocol. The company's network equipment is a mix of Cisco and non-Cisco devices. You need a solution that will work seamlessly across all devices and provide a single virtual IP address as the default gateway for the subnet. Which First Hop Redundancy Protocol would be MOST suitable for this scenario?

VRRP

A network engineer is tasked with configuring a new network segment for the marketing department. The department requires its own VLAN (VLAN50) to segregate its traffic from the rest of the company. The network consists of a Layer 3 switch and multiple Layer 2 switches. The engineer decides to use an SVI for VLAN routing.Which of the following commands should the engineer use to configure the SVI for VLAN50 on the Layer 3 switch?

interface VLAN50 ip address 192.168.50.1 255.255.255.0

A security analyst has noticed unusual network activity on a Linux server and wants to identify any external connections made to or from the server. The analyst is particularly interested in connections that are currently active. Which netstat command should the security analyst use to focus on active connections?

netstat

You are a network administrator troubleshooting a name resolution issue within your company's internal network. You suspect that the DNS server might not be resolving internal hostnames correctly. Which nslookup command should you use to query the DNS server for the hostname internal-server.company.local?

nslookup internal-server.company.local

During routine monitoring, a network administrator notices that one of the switch interfaces, which is part of a link aggregation group, is showing as suspended. The administrator needs to determine why the port is suspended and what steps to take to resolve the issue.What command should the administrator use to gather the necessary information about the link aggregation group and its member ports?

show etherchannel summary


संबंधित स्टडी सेट्स

LS1 Week 8 Chapter 41 Management of Pt With Musculoskeletal Disorders

View Set

Lesson 1 Intro To Short Stories (Completed)

View Set

Conceptual Physics: Momentum, Impulse, and Collisions

View Set

Mental health Nursing Videbeck 22-24

View Set

map assignment - australia/oceania

View Set

Learning Quiz | Sexually Transmitted Infections

View Set

Single entry and incomplete records

View Set

PSY343 - Group Dynamics Exam 1 (Ch. 1-4)

View Set

Unit 11 - Types of Investment Risks

View Set

AP Euro Chapter 15 Final study guide

View Set