A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?A . /24B . /25C . /30D . /32 View Answer Answer: C...
A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output: Which of the following changes should be made to allow all customers to access the company’s secure website?A . Allow any any 10.5.0.10 443B . Allow any any 126.96.36.199 443C...Continue reading
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?A . 10.8.0.0/16B . 10.8.0.0/19C . 10.8.0.0/20D . 10.0.0.0/24 View Answer Answer: A...
A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of...Continue reading
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?A . SSH in tunnel modeB . RDP set to console connectionC . EAP-PEAPD . SFTP View Answer Answer:...Continue reading
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC . SaaSD . DaaS...Continue reading
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?A . DHCP relayB . DHCP exclusionC . DHCP optionD ....Continue reading
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the...Continue reading
Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy server View Answer Answer: B...
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which...Continue reading