Which of the following command-line tools would generate this output?

Given the following information: Which of the following command-line tools would generate this output?A . netstat B. arp C. dig D. tracertView AnswerAnswer: A

February 13, 2023 No Comments READ MORE +

Which of the following policies should the network administrator implements to BEST mitigate this issue?

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portal B. Two-factor authentication C. Complex passwords D. Geofencing E. Role-based access F. Explicit denyView...

February 13, 2023 No Comments READ MORE +

Which of the following ports should be blocked when checking firewall configuration?

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22 B. 23 C. 80 D. 3389 E. 8080View AnswerAnswer: B

February 12, 2023 No Comments READ MORE +

Which of the following would be the MOST appropriate way to enable secure remote printing?

A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall. Which of the following would be the MOST appropriate way to enable secure remote printing?A . SSH...

February 12, 2023 No Comments READ MORE +

Which of the following is the physical topology for an Ethernet LAN?

Which of the following is the physical topology for an Ethernet LAN?A . Bus B. Ring C. Mesh D. StarView AnswerAnswer: D

February 12, 2023 No Comments READ MORE +

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposes B. A duplication of a hosted virtual server to another physical server for redundancy C. A download of navigation data to...

February 12, 2023 No Comments READ MORE +

Which of the following attack types BEST describes this action?

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D

February 12, 2023 No Comments READ MORE +

Which of the following describes how the network administrator can resolve this issue?

A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of...

February 12, 2023 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC...

February 12, 2023 No Comments READ MORE +

After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?

A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?A ....

February 12, 2023 No Comments READ MORE +