Which of the following ports should be blocked when checking firewall configuration?

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22B . 23C . 80D . 3389E . 8080View AnswerAnswer: B Explanation: Port 23 should be blocked...

December 26, 2023 No Comments READ MORE +

Which of the following can the administrator do to MOST easily mitigate this issue?

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levelsB . Adjust the wireless channelsC . Enable wireless...

December 26, 2023 No Comments READ MORE +

Which of the following describes how the network administrator can resolve this issue?

A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of...

December 26, 2023 No Comments READ MORE +

Which of the following access methods would provide the BEST security for this new datacenter?

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computingB . Secure Socket ShellC . In-band...

December 25, 2023 No Comments READ MORE +

Which of the following would be MOST affected by this statistic?

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?A . A VoIP sales call with a...

December 25, 2023 No Comments READ MORE +

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposesB . A duplication of a hosted virtual server to another physical server for redundancyC . A download of navigation data to...

December 25, 2023 No Comments READ MORE +

Which of the following systems would MOST likely be found in a screened subnet?

Which of the following systems would MOST likely be found in a screened subnet?A . RADIUSB . FTPC . SQLD . LDAPView AnswerAnswer: B Explanation: FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a...

December 25, 2023 No Comments READ MORE +

Which of the following describes the issue?

A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...

December 25, 2023 No Comments READ MORE +

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?A . Scope optionsB . ReservationC . Dynamic assignmentD . ExclusionE . Static assignmentView AnswerAnswer: B Explanation: A reservation should be configured to ensure...

December 25, 2023 No Comments READ MORE +

You are tasked with verifying the following requirements are met in order to ensure network security.

You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic...

December 25, 2023 No Comments READ MORE +