A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light.
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:A . using a bottom-to-top approach. B. establishing a plan of action. C. documenting a finding. D. questioning the obvious.View AnswerAnswer:...
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...
Which of the following attack types BEST describes this action?
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?A . Pass-the-hash attack B. Rainbow table attack C. Brute-force attack D. Dictionary attackView AnswerAnswer: D
Which of the following metrics confirms there is a cabling issue?
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...
To which of the following addresses should the software be configured to send the query?
A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?A . 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31View AnswerAnswer:...
Which of the following is MOST likely occurring?
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?A . Ethernet collisions B. A...
Which of the following is the LARGEST MTU for a standard Ethernet frame?
Which of the following is the LARGEST MTU for a standard Ethernet frame?A . 1452 B. 1492 C. 1500 D. 2304View AnswerAnswer: C
Which of the following protocols should the organization use to allow for authentication, authorization and auditing?
An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?A . MS-CHAP B. RADIUS C. LDAPS D. RSTPView AnswerAnswer: A
Which of the following ports is commonly used by VoIP phones?
Which of the following ports is commonly used by VoIP phones?A . 20 B. 143 C. 445 D. 5060View AnswerAnswer: D
Which of the following uses the destination IP address to forward packets?
Which of the following uses the destination IP address to forward packets?A . A bridge B. A Layer 2 switch C. A router D. A repeaterView AnswerAnswer: C