Which of the following deployment models is the best choice for the organization?
To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of...
Which of the following is the best explanation?
A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?A . The web server Is In a different subnet.B . The router interface is a...
Which of the following would need to be configured in order to use the ISP's connection speed?
A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to...
Which of the following types of attacks is this scenario an example of?
As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?A . ARP spoofingB . Evil twinC . MAC floodingD . DNS poisoningView AnswerAnswer: C Explanation: Definition of MAC Flooding:...
Which of the following command-line tools is the network administrator using?
Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output: 1 3ms 2ms 3ms 192.168.25.234 2 2ms 3ms 1ms 192.168.3.100 3 4ms 5ms 2ms 10.249.3.1 4 * 5 ’ 6 * 7 • Which of the following...
Which of the following best explains the role of confidentiality with regard to data at rest?
Which of the following best explains the role of confidentiality with regard to data at rest? A. DHCP relay device B. Policy enforcement point C. Definition file for event translation D. Network access controllerView AnswerAnswer: C Explanation: Confidentiality with Data at Rest: Confidentiality is a core principle of data security,...
Which of the following values would the network administrator expect to see?
A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?A . 4096B . 8192C . 32768D . 36684View AnswerAnswer: C Explanation: Understanding Spanning Tree...
Which of the following should the administrator use to accomplish this task?
A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?A . ACLsB . Port securityC . Content filteringD . NACView AnswerAnswer: A Explanation: Understanding ACLs: Access Control Lists (ACLs): A set of rules used to control network traffic...
Which of the following should the engineer do to resolve the issue?
A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?A . Update the firmware.B . Replace the system board.C . Patch the OS.D . Isolate the system.View AnswerAnswer: A Explanation: Understanding the Vulnerability: Vulnerabilities...
organization’s architecture?
Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?A . HoneynetB . Data-at-rest encryptionC . Time-based authenticationD . Network segmentationView AnswerAnswer: D Explanation: Network segmentation involves dividing a network into smaller segments or subnets. This is particularly important when integrating OT (Operational...