A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light.

A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:A . using a bottom-to-top approach. B. establishing a plan of action. C. documenting a finding. D. questioning the obvious.View AnswerAnswer:...

March 7, 2023 No Comments READ MORE +

Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?

Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...

March 7, 2023 No Comments READ MORE +

Which of the following attack types BEST describes this action?

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D

March 7, 2023 No Comments READ MORE +

Which of the following metrics confirms there is a cabling issue?

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...

March 7, 2023 No Comments READ MORE +

To which of the following addresses should the software be configured to send the query?

A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?A . 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31View AnswerAnswer:...

March 7, 2023 No Comments READ MORE +

Which of the following is MOST likely occurring?

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?A . Ethernet collisions B. A...

March 7, 2023 No Comments READ MORE +

Which of the following is the LARGEST MTU for a standard Ethernet frame?

Which of the following is the LARGEST MTU for a standard Ethernet frame?A . 1452 B. 1492 C. 1500 D. 2304View AnswerAnswer: C

March 7, 2023 No Comments READ MORE +

Which of the following protocols should the organization use to allow for authentication, authorization and auditing?

An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?A . MS-CHAP B. RADIUS C. LDAPS D. RSTPView AnswerAnswer: A

March 7, 2023 No Comments READ MORE +

Which of the following ports is commonly used by VoIP phones?

Which of the following ports is commonly used by VoIP phones?A . 20 B. 143 C. 445 D. 5060View AnswerAnswer: D

March 7, 2023 No Comments READ MORE +

Which of the following uses the destination IP address to forward packets?

Which of the following uses the destination IP address to forward packets?A . A bridge B. A Layer 2 switch C. A router D. A repeaterView AnswerAnswer: C

March 6, 2023 No Comments READ MORE +