Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?A . MAC address reservationB . Static IP addressC . IP address exclusionD . Custom DNS server entryView AnswerAnswer: A

May 18, 2020 No Comments READ MORE +

Which of the following changes should be made to allow all customers to access the company’s secure website?

A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output: Which of the following changes should be made to allow all customers to access the company’s secure website?A . Allow any any 10.5.0.10 443B . Allow...

May 18, 2020 No Comments READ MORE +

Which of the following should be implemented?

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A

May 18, 2020 No Comments READ MORE +

Which of the following is a Layer 2 access control the technician should implement?

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?A . Access control listsB . Captive portalC . WPA2D . Port securityView AnswerAnswer: D

May 18, 2020 No Comments READ MORE +

Which of the following should the technician do FIRST to reconnect the server to the network?

After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the...

May 17, 2020 No Comments READ MORE +

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:A . penetration testingB . vulnerability scanningC . reconnaissanceD . social engineeringView AnswerAnswer: A  

May 17, 2020 No Comments READ MORE +

Which of the following would allow SSH to function properly?

A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?A . Perform file hashingB . Generate...

May 17, 2020 No Comments READ MORE +

Which of the following is the BEST to utilize in these areas?

An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas?A . Single-mode fiber-optic cablingB . Cat 5e-rated cablingC . Cat 6-rated cablingD . Plenum-rated cablingView AnswerAnswer: D

May 17, 2020 No Comments READ MORE +

Which of the following represents the BEST configuration for the remote site?

A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network...

May 17, 2020 No Comments READ MORE +

Which of the following protocols should the technician use to increase speed and fault tolerance?

A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?A . SIPB . BGPC . LACPD . LLDPView AnswerAnswer: C

May 17, 2020 No Comments READ MORE +