Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSO B. TACACS+ C. Zero Trust D. Separation of duties E. Multifactor authenticationView AnswerAnswer: B Explanation: TACACS+ (Terminal Access Controller Access Control System Plus) can be used to...

August 20, 2023 No Comments READ MORE +

Which of the following command-line tools would generate this output?

Given the following information: Which of the following command-line tools would generate this output?A . netstat B. arp C. dig D. tracertView AnswerAnswer: D Explanation: Tracert is a command-line tool that traces the route of a packet from a source to a destination and displays the number of hops and...

August 20, 2023 No Comments READ MORE +

Which of the following can the administrator do to MOST easily mitigate this issue?

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levels B. Adjust the wireless channels C. Enable wireless...

August 19, 2023 No Comments READ MORE +

Which of the following attacks did the network administrator prevent?

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twin B. Tailgating C. Piggybacking D. Shoulder surfingView AnswerAnswer: B Explanation: Tailgating...

August 19, 2023 No Comments READ MORE +

Which of the following metrics confirms there is a cabling issue?

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...

August 19, 2023 No Comments READ MORE +

Which of the following describes the issue?

A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...

August 19, 2023 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC...

August 19, 2023 No Comments READ MORE +

Which of the following metrics will MOST accurately show the underlying performance issues?

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usage B....

August 19, 2023 No Comments READ MORE +

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposes B. A duplication of a hosted virtual server to another physical server for redundancy C. A download of navigation data to...

August 19, 2023 No Comments READ MORE +

Which of the following would be BEST to use to detect a MAC spoofing attack?

Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access ProtocolView AnswerAnswer: B Explanation: Reverse Address Resolution Protocol (RARP) is a protocol that allows a device...

August 19, 2023 No Comments READ MORE +