Which of the following should be leveraged to complete this task?

A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC...

July 11, 2020 No Comments READ MORE +

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?A . Sticky MACB . 802.1xC . ACLD . NACView AnswerAnswer: A

July 11, 2020 No Comments READ MORE +

Which of the following is a vulnerable system designed to detect and log unauthorized access?

Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B

July 10, 2020 No Comments READ MORE +

Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?

A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?A . /24B . /25C . /30D . /32View AnswerAnswer: C

July 10, 2020 No Comments READ MORE +

Which of the following is MOST effective in resolving this issue?

A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with a public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random,...

July 10, 2020 No Comments READ MORE +

Which of the following patch cables would the technician need to complete the installation?

A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch...

July 10, 2020 No Comments READ MORE +

Which of the following protocols should the technician use to increase speed and fault tolerance?

A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?A . SIPB . BGPC . LACPD . LLDPView AnswerAnswer: C

July 10, 2020 No Comments READ MORE +

Which of the following protocols do MOST MITM attacks utilize?

Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A

July 10, 2020 No Comments READ MORE +

After optimizing the network, which of the following would be required?

Users have been experiencing slow network response times, and management has asked the network technician to provide evidence of network improvement. After optimizing the network, which of the following would be required?A . IDF/MDF documentationB . Change managementC . Performance baselineD . Physical diagramView AnswerAnswer: C

July 10, 2020 No Comments READ MORE +

Which of the following tools should be used to BEST determine where the outage is occurring?

Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?A . tracerouteB . pingC...

July 10, 2020 No Comments READ MORE +