Which of the following should a technician try first to troubleshoot this issue?
A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?A . Reverse...
Which of the following routing protocols uses an autonomous system number?
Which of the following routing protocols uses an autonomous system number?A . IS-ISB . EIGRPC . OSPFD . BGPView AnswerAnswer: D Explanation: BGP (Border Gateway Protocol) uses an Autonomous System (AS) number for its operations. An AS is a collection of IP networks and routers under the control of a...
Which of the following subnet masks should the administrator use?
A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?A . 255.255.0.0B . 255.255.254.0C . 255.255.255.0D . 255.255.255.128View AnswerAnswer: D Explanation: Understanding Subnetting: Original Network: 192.168.1.0/24 has a subnet mask of 255.255.255.0, which allows for 256 IP addresses (including...
Which of the following is the next step to take after successfully testing a root cause theory?
Which of the following is the next step to take after successfully testing a root cause theory?A . Determine resolution steps.B . Duplicate the problem in a lab.C . Present the theory for approval.D . Implement the solution to the problem.View AnswerAnswer: A Explanation: Troubleshooting Methodology: Confirming the Root Cause:...
Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?
Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?A . DNS poisoningB . Denial-of-serviceC . Social engineeringD . ARP spoofingView AnswerAnswer: A Explanation: Network segmentation involves dividing a network into smaller segments or subnets. This...
Which of the following is the best security feature to accomplish this task?
A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?A . 802.1XB . Access control listC . Port securityD . MAC...
Which of the following needs to be done on the port to address the issue?
A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?A . Trunk all VLANs on the port.B . Configure the native VLAN.C . Tag the traffic to voice VLAN.D . Disable VLANs.View...
Which of the following is a cost-effective advantage of a split-tunnel VPN?
Which of the following is a cost-effective advantage of a split-tunnel VPN?A . Web traffic is filtered through a web filter.B . More bandwidth is required on the company's internet connection.C . Monitoring detects insecure machines on the company’s network.D . Cloud-based traffic flows outside of the company's network.View AnswerAnswer:...
Which of the following commands should the administrator run on the server first?
A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on...
Which of the following attacks would most likely cause duplicate IP addresses in a network?
Which of the following attacks would most likely cause duplicate IP addresses in a network?A . Rogue DHCP serverB . DNS poisoningC . Social engineeringD . Denial-of-serviceView AnswerAnswer: A Explanation: Definition of a Rogue DHCP Server: A rogue DHCP server is an unauthorized DHCP server on a network, which can...