Within the realm of network security, Zero Trust:
Within the realm of network security, Zero Trust:A . prevents attackers from moving laterally through a system. B. allows a server to communicate with outside networks without a firewall. C. block malicious software that is too new to be found in virus definitions. D. stops infected files from being downloaded...
Which of the following is the physical topology for an Ethernet LAN?
Which of the following is the physical topology for an Ethernet LAN?A . Bus B. Ring C. Mesh D. StarView AnswerAnswer: D
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?A . PaaS B. IaaS C. SaaS D. Disaster recovery as a Service (DRaaS)View AnswerAnswer: B
Which of the following TCP ports is used by the Windows OS for file sharing?
Which of the following TCP ports is used by the Windows OS for file sharing?A . 53 B. 389 C. 445 D. 1433View AnswerAnswer: C
Which of the following does this BEST describe?
An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company...
Which of the following should the systems administrator select to meet this requirement?
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?A . 802.11ac B. 802.11ax C....
Which of the following is used to track and document various types of known vulnerabilities?
Which of the following is used to track and document various types of known vulnerabilities?A . CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilegeView AnswerAnswer: A
Which of the following should a network technician do FIRST?
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?A . Check the system’s IP address B. Do a ping test against the servers C. Reseat the cables into the back of the PC...
Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?A . OTDR B. Tone generator C. Fusion splicer D. Cable tester E. PoE injectorView AnswerAnswer: A
Which of the following can the administrator perform to resolve the issue?
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?A . Install load balancers B. Install more switches C. Decrease the number...