Which of the following subnets should the technician use?

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?A . 255.255.128.0B . 255.255.192.0C . 255.255.240.0D . 255.255.248.0View AnswerAnswer: C Explanation: A subnet mask is a binary number that indicates...

December 14, 2023 No Comments READ MORE +

You are tasked with verifying the following requirements are met in order to ensure network security.

You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic...

December 14, 2023 No Comments READ MORE +

Which of the following should a network security administrator recommend to assist with detecting these activities?

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring.B . Change the default credentials.C...

December 13, 2023 No Comments READ MORE +

After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?

A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?A ....

December 13, 2023 No Comments READ MORE +

''Who is 192.168.1.200?

An ARP request is broadcasted and sends the following request. ''Who is 192.168.1.200? Tell 192.168.1.55'' At which of the following layers of the OSI model does this request operate?A . ApplicationB . Data linkC . TransportD . NetworkE . SessionView AnswerAnswer: B Explanation: An ARP request operates at the data...

December 13, 2023 No Comments READ MORE +

Which of the following documents would BEST support this?

The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained. Which of the following documents would BEST support this?A . An incident response planB . A business continuity planC . A change management policyD . An acceptable use policyView AnswerAnswer:...

December 13, 2023 No Comments READ MORE +

Which of the following documents would MOST likely be created as a result of the site survey?

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?A . Physical diagramB . Heat mapC . Asset listD . Device mapView AnswerAnswer: B Explanation:...

December 13, 2023 No Comments READ MORE +

Which of the following systems would MOST likely be found in a screened subnet?

Which of the following systems would MOST likely be found in a screened subnet?A . RADIUSB . FTPC . SQLD . LDAPView AnswerAnswer: B Explanation: FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a...

December 13, 2023 No Comments READ MORE +

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?A . Establish a plan of action to resolve the issue and identify potential effectsB . Verify full system functionality and, if applicable, implement preventive measuresC . Implement...

December 13, 2023 No Comments READ MORE +

Which of the following routing protocols is used to exchange route information between public autonomous systems?

Which of the following routing protocols is used to exchange route information between public autonomous systems?A . OSPFB . BGPC . EGRIPD . RIPView AnswerAnswer: B Explanation: BGP (Border Gateway Protocol) is a routing protocol used to exchange route information between public autonomous systems (AS). OSPF (Open Shortest Path First),...

December 13, 2023 No Comments READ MORE +