''Who is 192.168.1.200?
An ARP request is broadcasted and sends the following request. ''Who is 192.168.1.200? Tell 192.168.1.55'' At which of the following layers of the OSI model does this request operate?A . ApplicationB . Data linkC . TransportD . NetworkE . SessionView AnswerAnswer: B Explanation: An ARP request operates at the data...
Which of the following is MOST likely occurring?
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?A . Ethernet collisionsB . A...
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?A . Layer 3 switchB . VPN headendC . Next-generation firewallD . Proxy serverE . Intrusion preventionView AnswerAnswer: C Explanation: Next-generation firewalls can provide content filtering and threat protection, and can...
Which of the following switch features will MOST likely be used to assist with this task?
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?A . Spanning Tree ProtocolB . Neighbor Discovery ProtocolC . Link Aggregation Control...
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...
Which of the following is the MOST likely cause of this issue?
A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?A...
Which of the following should be adjusted to address the issue?
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?A . TTL B. MX C. TXT D. SOAView AnswerAnswer: A Explanation: TTL (Time To Live) should be adjusted to address the...
Which of the following devices would be used to manage a corporate WLAN?
Which of the following devices would be used to manage a corporate WLAN?A . A wireless NAS B. A wireless bridge C. A wireless router D. A wireless controllerView AnswerAnswer: D Explanation: A wireless controller is used to manage a corporate WLAN, providing centralized management and configuration of access points.
Which of the following should the technician review on the switch to locate the device’s network port?
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?A . IP route table B. VLAN tag C. MAC table D. QoS tagView...
Which of the following ports should be blocked when checking firewall configuration?
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?A . 22 B. 23 C. 80 D. 3389 E. 8080View AnswerAnswer: B Explanation: Port 23 should be blocked...