Which of the following should a network technician do FIRST?
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?A . Check the system’s IP address B. Do a ping test against the servers C. Reseat the cables into the back of the PC...
Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?A . OTDR B. Tone generator C. Fusion splicer D. Cable tester E. PoE injectorView AnswerAnswer: A
Which of the following can the administrator perform to resolve the issue?
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?A . Install load balancers B. Install more switches C. Decrease the number...
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?A . NIC teaming B. Load balancer C. RAID array D. PDUsView AnswerAnswer: A
Which of the following needs to be configured on the server?
A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?A . Load balancing B....
Which of the following attacks did the network administrator prevent?
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twin B. Tailgating C. Piggybacking D. Shoulder surfingView AnswerAnswer: B
Which of the following would be the MOST appropriate way to enable secure remote printing?
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall. Which of the following would be the MOST appropriate way to enable secure remote printing?A . SSH...
Which of the following switch features will MOST likely be used to assist with this task?
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?A . Spanning Tree Protocol B. Neighbor Discovery Protocol C. Link Aggregation Control...
Which of the following can the administrator do to MOST easily mitigate this issue?
A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levels B. Adjust the wireless channels C. Enable wireless...
Which of the following allows the enforcement of this policy?
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?A . Motion detection B. Access control vestibules C. Smart lockers D. CamerasView AnswerAnswer: B Explanation: The most...