Which of the following should be leveraged to complete this task?
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC...
Which of the following has the user MOST likely introduced to the network?
A network technician receives a call from a user who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced...
Which of the following tools would provide the information on TCP connections?
A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would provide the information on TCP connections?A . netstatB . tracertC . arpD . ipconfigE . routeView AnswerAnswer: A
Which of the following network topologies do these represent?
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)A . Point-to-multipointB . BusC . Point-to-pointD . MeshE . Peer-peerF . RingView AnswerAnswer: C,D
Which of the following protocols do MOST MITM attacks utilize?
Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A
Which of the following should be added to allow the clients to connect?
Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?A . DHCP lease timeB . IP helperC . TTLD . DNS record typeView AnswerAnswer: B
Which of the following will allow the request to be fulfilled without breaking the corporate policy?
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?A . DHCP relayB . DHCP exclusionC...
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?A . NDAB . IRPC . BYODD . SLAView AnswerAnswer: C
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
Which of the following MUST be implemented to share metrics between routing protocols within the same router?A . Routing loopB . Routing tableC . Route redistributionD . Dynamic routesView AnswerAnswer: B
According to the OSI model, at which of the following layers is data encapsulated into a packet?
According to the OSI model, at which of the following layers is data encapsulated into a packet?A . Layer 2B . Layer 3C . Layer 4D . Layer 5E . Layer 6View AnswerAnswer: B