Which of the following tools should the technician use to determine which link is being used for the web application?

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?A . netstatB . nslookupC . pingD . tracertView AnswerAnswer:...

May 10, 2025 No Comments READ MORE +

Which of the following deployment models is the best choice for the organization?

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of...

May 7, 2025 No Comments READ MORE +

Which of the following is the best explanation?

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?A . The web server Is In a different subnet.B . The router interface is a...

May 6, 2025 No Comments READ MORE +

Which of the following would need to be configured in order to use the ISP's connection speed?

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to...

May 6, 2025 No Comments READ MORE +

Which of the following types of attacks is this scenario an example of?

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?A . ARP spoofingB . Evil twinC . MAC floodingD . DNS poisoningView AnswerAnswer: C Explanation: Definition of MAC Flooding:...

May 2, 2025 No Comments READ MORE +

Which of the following command-line tools is the network administrator using?

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output: 1 3ms 2ms 3ms 192.168.25.234 2 2ms 3ms 1ms 192.168.3.100 3 4ms 5ms 2ms 10.249.3.1 4 * 5 ’ 6 * 7 • Which of the following...

May 2, 2025 No Comments READ MORE +

Which of the following best explains the role of confidentiality with regard to data at rest?

Which of the following best explains the role of confidentiality with regard to data at rest? A. DHCP relay device B. Policy enforcement point C. Definition file for event translation D. Network access controllerView AnswerAnswer: C Explanation: Confidentiality with Data at Rest: Confidentiality is a core principle of data security,...

April 30, 2025 No Comments READ MORE +

Which of the following values would the network administrator expect to see?

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?A . 4096B . 8192C . 32768D . 36684View AnswerAnswer: C Explanation: Understanding Spanning Tree...

April 28, 2025 No Comments READ MORE +

Which of the following should the administrator use to accomplish this task?

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?A . ACLsB . Port securityC . Content filteringD . NACView AnswerAnswer: A Explanation: Understanding ACLs: Access Control Lists (ACLs): A set of rules used to control network traffic...

April 27, 2025 No Comments READ MORE +

Which of the following should the engineer do to resolve the issue?

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?A . Update the firmware.B . Replace the system board.C . Patch the OS.D . Isolate the system.View AnswerAnswer: A Explanation: Understanding the Vulnerability: Vulnerabilities...

April 23, 2025 No Comments READ MORE +