Which of the following ports should be blocked when checking firewall configuration?
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22B . 23C . 80D . 3389E . 8080View AnswerAnswer: B Explanation: Port 23 should be blocked...
Which of the following can the administrator do to MOST easily mitigate this issue?
A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levelsB . Adjust the wireless channelsC . Enable wireless...
Which of the following describes how the network administrator can resolve this issue?
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of...
Which of the following access methods would provide the BEST security for this new datacenter?
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computingB . Secure Socket ShellC . In-band...
Which of the following would be MOST affected by this statistic?
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?A . A VoIP sales call with a...
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposesB . A duplication of a hosted virtual server to another physical server for redundancyC . A download of navigation data to...
Which of the following systems would MOST likely be found in a screened subnet?
Which of the following systems would MOST likely be found in a screened subnet?A . RADIUSB . FTPC . SQLD . LDAPView AnswerAnswer: B Explanation: FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a...
Which of the following describes the issue?
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?A . Scope optionsB . ReservationC . Dynamic assignmentD . ExclusionE . Static assignmentView AnswerAnswer: B Explanation: A reservation should be configured to ensure...
You are tasked with verifying the following requirements are met in order to ensure network security.
You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic...