Which of the following should the technician use to determine which statistics are not in the normal range?
A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician use to determine which statistics are not in the normal range?A . Baseline reviewB . Vulnerability scanC . System life-cycle reportD . Archiving logsView AnswerAnswer: A
Which of the following should the technician do to make a crossover cable before crimping the new plug?
A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off...
Which of the following should the technician install to BEST meet the goal?
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router...
Which of the following steps should the network technician take NEXT?
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?A . Test the possible solutionB . Question the usersC . Determine what has changedD . Document the theoryView AnswerAnswer: A
Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?
A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?A . /24B . /25C . /30D . /32View AnswerAnswer: C
Which of the following solutions is MOST likely to resolve the problem?
A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However,...
Which of the following physical network topologies was created?
A network technician has created a network that consists of a router, a firewall, a switch, and several PCs. Which of the following physical network topologies was created?A . StarB . MeshC . RingD . BusView AnswerAnswer: D
Which of the following is the BEST to utilize in these areas?
An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas?A . Single-mode fiber-optic cablingB . Cat 5e-rated cablingC . Cat 6-rated cablingD . Plenum-rated cablingView AnswerAnswer: D
Which of the following should the network administrator do to rule out any problems at Layer 1?
A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following...
Which of the following is a vulnerable system designed to detect and log unauthorized access?
Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B