Which of the following would be BEST to use to detect a MAC spoofing attack?

Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access ProtocolView AnswerAnswer: B

December 22, 2022 No Comments READ MORE +

Which of the following needs to be configured for these networks to reach each other?

A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?A . Network address translation B. Default gateway C. Loopback D. Routing protocolView AnswerAnswer: B

December 22, 2022 No Comments READ MORE +

Which of the following systems would MOST likely be found in a screened subnet?

Which of the following systems would MOST likely be found in a screened subnet?A . RADIUS B. FTP C. SQL D. LDAPView AnswerAnswer: B

December 22, 2022 No Comments READ MORE +

Which of the following switch features will MOST likely be used to assist with this task?

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?A . Spanning Tree Protocol B. Neighbor Discovery Protocol C. Link Aggregation Control...

December 22, 2022 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC...

December 22, 2022 No Comments READ MORE +

Which of the following transceiver types can support up to 40Gbps?

Which of the following transceiver types can support up to 40Gbps?A . SFP+ B. QSFP+ C. QSFP D. SFPView AnswerAnswer: B

December 21, 2022 No Comments READ MORE +

Which of the following is MOST likely occurring?

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?A . Ethernet collisions B. A...

December 21, 2022 No Comments READ MORE +

Which of the following must the administrator configure to ensure connectivity during a failover?

A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?A . VIP B. NAT C. APIPA D. IPv6 tunneling E. Broadcast IPView AnswerAnswer: A

December 21, 2022 No Comments READ MORE +

Which of the following pieces of equipment would be able to handle this requirement?

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections. Which of the following pieces of equipment would be able to handle this requirement?A . A VPN concentrator B. A load balancer...

December 21, 2022 No Comments READ MORE +

Which of the following should the technician configure on the switch to prevent unintended connections?

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?A . DHCP snooping B. Geofencing C. Port security D. Secure SNMPView AnswerAnswer: C

December 21, 2022 No Comments READ MORE +