At which of the following OSI model layers would a technician find an IP header?
At which of the following OSI model layers would a technician find an IP header?A . Layer 1 B. Layer 2 C. Layer 3 D. Layer 4View AnswerAnswer: C
Which of the following should the technician review on the switch to locate the device’s network port?
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route table B. VLAN tag C. MAC table D. QoS tagView...
Which of the following should the technician utilize for the switch?
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?A . MIB B. Trap C....
Which of the following technologies BEST meets the organization’s requirements?
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?A . Load balancing B. Geofencing C. Public cloud D. Content delivery network E. Infrastructure as a serviceView AnswerAnswer: D
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposes B. A duplication of a hosted virtual server to another physical server for redundancy C. A download of navigation data to...
CORRECT TEXT
CORRECT TEXT You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port...
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switch B. VPN headend C. Next-generation firewall D. Proxy server E. Intrusion preventionView AnswerAnswer: C
Which of the following ports should be blocked when checking firewall configuration?
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22 B. 23 C. 80 D. 3389 E. 8080View AnswerAnswer: B
Which of the following access methods would provide the BEST security for this new datacenter?
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computing B. Secure Socket Shell C. In-band...
Which of the following command-line tools would generate this output?
Given the following information: Which of the following command-line tools would generate this output?A . netstat B. arp C. dig D. tracertView AnswerAnswer: A