Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposes B. A duplication of a hosted virtual server to another physical server for redundancy C. A download of navigation data to...

January 1, 2023 No Comments READ MORE +

Which of the following would be BEST suited for the LAN interface?

A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?A . 172.15.0.0/18 B. 172.18.0.0/10 C. 172.23.0.0/16 D. 172.28.0.0/8 E. 172.32.0.0/14View AnswerAnswer: C

December 31, 2022 No Comments READ MORE +

Which of the following metrics will MOST accurately show the underlying performance issues?

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usage B....

December 31, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless...

December 31, 2022 No Comments READ MORE +

Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...

December 31, 2022 No Comments READ MORE +

Which of the following should be adjusted to address the issue?

After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?A . TTL B. MX C. TXT D. SOAView AnswerAnswer: A

December 31, 2022 No Comments READ MORE +

Which of the following can the administrator perform to resolve the issue?

Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?A . Install load balancers B. Install more switches C. Decrease the number...

December 31, 2022 No Comments READ MORE +

Which of the following would be BEST to use to stop this from happening without physically removing the WAP?

A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?A . Password complexity B. Port security C. Wireless client isolation D. Secure SNMPView AnswerAnswer:...

December 31, 2022 No Comments READ MORE +

Which of the following should a wireless technician do NEXT to troubleshoot this issue?

Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a...

December 30, 2022 No Comments READ MORE +

Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?

Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...

December 30, 2022 No Comments READ MORE +