Which of the following allows the enforcement of this policy?
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?A . Motion detectionB . Access control vestibulesC . Smart lockersD . CamerasView AnswerAnswer: B Explanation: The most...
Which of the following should be adjusted to address the issue?
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?A . TTLB . MXC . TXTD . SOAView AnswerAnswer: A Explanation: TTL (Time To Live) should be adjusted to address the...
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G ....
Which of the following would be the MOST likely result of this finding?
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?A . Increased CRC errorsB . Increased giants and runtsC . Increased...
Which of the following will MOST likely replace all the company’s hubs?
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?A . A Layer 3 switchB . A proxy serverC . A NGFWD . A WLAN controllerView AnswerAnswer: A Explanation: A Layer 3 switch will likely...
Which of the following should a network administrator configure to BEST prevent unauthorized access?
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?A . Enable a management access listB . Disable access to unnecessary...
Which of the following is used to prioritize Internet usage per application and per user on the network?
Which of the following is used to prioritize Internet usage per application and per user on the network?A . Bandwidth managementB . Load balance routingC . Border Gateway ProtocolD . Administrative distanceView AnswerAnswer: A Explanation: Bandwidth management is used to prioritize Internet usage per application and per user on the...
Which of the following BEST describes how the switch processes this information?
A network technician is observing the behavior of an unmanaged switch when a new device is added to the network and transmits data. Which of the following BEST describes how the switch processes this information?A . The data is flooded out of every port. including the one on which it...
A technician is assisting a user who cannot connect to a network resource.
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:A . using a bottom-to-top approach.B . establishing a plan of action.C . documenting a finding.D . questioning the obvious.View AnswerAnswer:...
Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...