Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?A . OTDRB . Tone generatorC . Fusion splicerD . Cable testerE . PoE injectorView AnswerAnswer: A Explanation: To detect the exact break...
Which of the following subnets should the technician use?
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?A . 255.255.128.0B . 255.255.192.0C . 255.255.240.0D . 255.255.248.0View AnswerAnswer: C Explanation: A subnet mask is a binary number that indicates...
Which of the following would be BEST to use to detect a MAC spoofing attack?
Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message ProtocolB . Reverse Address Resolution ProtocolC . Dynamic Host Configuration ProtocolD . Internet Message Access ProtocolView AnswerAnswer: B Explanation: Reverse Address Resolution Protocol (RARP) is a protocol that allows a device...
Which of the following should a network security administrator recommend to assist with detecting these activities?
A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring.B . Change the default credentials.C...
Which of the following command-line tools would generate this output?
Given the following information: Which of the following command-line tools would generate this output?A . netstatB . arpC . digD . tracertView AnswerAnswer: D Explanation: Tracert is a command-line tool that traces the route of a packet from a source to a destination and displays the number of hops and...
After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?A ....
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSOB . TACACS+C . Zero TrustD . Separation of dutiesE . Multifactor authenticationView AnswerAnswer: B Explanation: TACACS+ (Terminal Access Controller Access Control System Plus) can be used to...
At which of the following OSI model layers would a technician find an IP header?
At which of the following OSI model layers would a technician find an IP header?A . Layer 1B . Layer 2C . Layer 3D . Layer 4View AnswerAnswer: C Explanation: An IP header can be found at the third layer of the OSI model, also known as the network layer....
Which of the following is used to track and document various types of known vulnerabilities?
Which of the following is used to track and document various types of known vulnerabilities?A . CVEB . Penetration testingC . Zero-dayD . SIEME . Least privilegeView AnswerAnswer: A Explanation: CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to...
Which of the following needs to be configured on the server?
A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?A . Load balancingB ....