Which of the following MUST be implemented to share metrics between routing protocols within the same router?
Which of the following MUST be implemented to share metrics between routing protocols within the same router?A . Routing loopB . Routing tableC . Route redistributionD . Dynamic routesView AnswerAnswer: B
Which of the following changes should be made to allow all customers to access the company’s secure website?
A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output: Which of the following changes should be made to allow all customers to access the company’s secure website?A . Allow any any 10.5.0.10 443B . Allow...
Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?
A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?A...
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?A . Guests should log into a separate wireless...
Which of the following should the technician use to secure the connection?
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?A . SSH in tunnel modeB . RDP set to console connectionC . EAP-PEAPD ....
Which of the following steps would MOST likely correct this issue?
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not...
Which of the following steps should the technician take NEXT?
Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT?A . Determine if any network equipment was replaced recentlyB...
According to the OSI model, at which of the following layers is data encapsulated into a packet?
According to the OSI model, at which of the following layers is data encapsulated into a packet?A . Layer 2B . Layer 3C . Layer 4D . Layer 5E . Layer 6View AnswerAnswer: B
Without the use of auto-sensing ports, which of the following cables should be used?
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?A . Straight-throughB . ConsoleC . RolloverD . CrossoverView AnswerAnswer: D
Which of the following should be implemented?
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A