Which of the following would be the MOST likely result of this finding?
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?A . Increased CRC errors B. Increased giants and runts C. Increased...
Which of the following commands would BEST help the administrator accomplish this task?
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?A . dig B. arp C. show interface D. hostnameView AnswerAnswer: A
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A . Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G....
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light.
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:A . using a bottom-to-top approach. B. establishing a plan of action. C. documenting a finding. D. questioning the obvious.View AnswerAnswer:...
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...
Which of the following attack types BEST describes this action?
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D
Which of the following metrics confirms there is a cabling issue?
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...
To which of the following addresses should the software be configured to send the query?
A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?A . 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31View AnswerAnswer:...
Which of the following is MOST likely occurring?
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?A . Ethernet collisions B. A...
Which of the following is the LARGEST MTU for a standard Ethernet frame?
Which of the following is the LARGEST MTU for a standard Ethernet frame?A . 1452 B. 1492 C. 1500 D. 2304View AnswerAnswer: C