At which of the following OSI model layers would a technician find an IP header?

At which of the following OSI model layers would a technician find an IP header?A . Layer 1 B. Layer 2 C. Layer 3 D. Layer 4View AnswerAnswer: C Explanation: An IP header can be found at the third layer of the OSI model, also known as the network layer....

August 11, 2023 No Comments READ MORE +

Which of the following commands would BEST help the administrator accomplish this task?

A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?A . dig B. arp C. show interface D. hostnameView AnswerAnswer: A Explanation: The dig command is used to query the NSs for a remote application....

August 10, 2023 No Comments READ MORE +

Which of the following documents would MOST likely be created as a result of the site survey?

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?A . Physical diagram B. Heat map C. Asset list D. Device mapView AnswerAnswer: B Explanation:...

August 10, 2023 No Comments READ MORE +

Within the realm of network security, Zero Trust:

Within the realm of network security, Zero Trust:A . prevents attackers from moving laterally through a system. B. allows a server to communicate with outside networks without a firewall. C. block malicious software that is too new to be found in virus definitions. D. stops infected files from being downloaded...

August 10, 2023 No Comments READ MORE +

Which of the following allows the enforcement of this policy?

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?A . Motion detection B. Access control vestibules C. Smart lockers D. CamerasView AnswerAnswer: B Explanation: The most...

August 10, 2023 No Comments READ MORE +

Which of the following is used to track and document various types of known vulnerabilities?

Which of the following is used to track and document various types of known vulnerabilities?A . CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilegeView AnswerAnswer: A Explanation: CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to...

August 10, 2023 No Comments READ MORE +

Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?A . Coaxial B. Single-mode fiber C. Cat 6e D. Multimode fiberView AnswerAnswer: A Explanation: Coaxial cable is a type of cable...

August 10, 2023 No Comments READ MORE +

Which of the following tools should the technician use to troubleshoot the issue?

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference...

August 10, 2023 No Comments READ MORE +

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switch B. VPN headend C. Next-generation firewall D. Proxy server E. Intrusion preventionView AnswerAnswer: C Explanation: Next-generation firewalls can provide content filtering and threat protection, and can...

August 9, 2023 No Comments READ MORE +

Which of the following should the engineer enable to prevent network stability issues?

An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?A . 802.1Q B. STP C. Flow control D. CSMA/CDView AnswerAnswer: B Explanation: Spanning Tree Protocol (STP) should be enabled when configuring redundant network links between switches. STP ensures...

August 9, 2023 No Comments READ MORE +