After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?A ....
Which of the following metrics should the technician check to begin troubleshooting the issue?
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?A . Audit logs B. CPU utilization C. CRC errors D. JitterView AnswerAnswer: B
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?A . Scope options B. Reservation C. Dynamic assignment D. Exclusion E. Static assignmentView AnswerAnswer: B
Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?A . Password complexity B. Port security C. Wireless client isolation D. Secure SNMPView AnswerAnswer:...
Which of the following attacks did the network administrator prevent?
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twin B. Tailgating C. Piggybacking D. Shoulder surfingView AnswerAnswer: B
Which of the following command-line tools would generate this output?
Given the following information: Which of the following command-line tools would generate this output?A . netstat B. arp C. dig D. tracertView AnswerAnswer: A
Which of the following should the technician review on the switch to locate the device’s network port?
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route table B. VLAN tag C. MAC table D. QoS tagView...
Which of the following should a network technician do FIRST?
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?A . Check the system’s IP address B. Do a ping test against the servers C. Reseat the cables into the back of the PC...
Which of the following commands would BEST help the administrator accomplish this task?
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?A . dig B. arp C. show interface D. hostnameView AnswerAnswer: A
Which of the following should the network administrator do to accomplish these requirements?
Allow devices to move to different switchports on the same VLAN Which of the following should the network administrator do to accomplish these requirements?A . Set up a reservation for each device B. Configure a static IP on each device C. Implement private VLANs for each device D. Use DHCP...