Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...
Which of the following is the MOST likely cause of this issue?
A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?A...
Which of the following should be adjusted to address the issue?
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?A . TTL B. MX C. TXT D. SOAView AnswerAnswer: A Explanation: TTL (Time To Live) should be adjusted to address the...
Which of the following devices would be used to manage a corporate WLAN?
Which of the following devices would be used to manage a corporate WLAN?A . A wireless NAS B. A wireless bridge C. A wireless router D. A wireless controllerView AnswerAnswer: D Explanation: A wireless controller is used to manage a corporate WLAN, providing centralized management and configuration of access points.
Which of the following should the technician review on the switch to locate the device’s network port?
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route table B. VLAN tag C. MAC table D. QoS tagView...
Which of the following ports should be blocked when checking firewall configuration?
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22 B. 23 C. 80 D. 3389 E. 8080View AnswerAnswer: B Explanation: Port 23 should be blocked...
Which of the following describes how the network administrator can resolve this issue?
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of...
After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?A ....
Which of the following will MOST likely replace all the company’s hubs?
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?A . A Layer 3 switch B. A proxy server C. A NGFW D. A WLAN controllerView AnswerAnswer: A Explanation: A Layer 3 switch will likely...
Which of the following describes the reason why the events are not being received?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are...