Which of the following should be included in a logical network diagram?
A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?A . Rack locationB . Room numberC . Media typeD . HostnameView AnswerAnswer: D
Which of the following authentication methods would meet this requirement?
A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods...
Which of the following devices should be used to accomplish this task?
To achieve a more efficient and secure work environment, a company needs a way to control what is being accessed on the Internet using corporate resources. Which of the following devices should be used to accomplish this task? (Choose two.)A . Proxy serverB . IDSC . Load balancerD . Content...
Which of the following network connection types would BEST accomplish this task?
A SAN serves out storage to a company’s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?A . InfiniBandB . iSCSIC . Fibre ChannelD...
Which of the following is the MOST likely cause?
A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?A . Expired IP addressB . Exhausted dynamic scopeC . Misconfigured VLSMD...
At which of the following layers of the OSI model does compression occur?
At which of the following layers of the OSI model does compression occur?A . SessionB . TransportC . Data linkD . PresentationView AnswerAnswer: D
Which of the following tools should be used to do this?
Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this?A . tcp dumpB . digC . nmapD . netstatView AnswerAnswer: C
Which of the following technologies should be configured on the OS to create the wireless connection?
A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?A . Partial meshB . Ad hocC . RingD . BusView AnswerAnswer: B
Which of the following should be configured on the load balancer to allow for a single destination?
To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?A . SIPB . PATC . NATD . VIPView AnswerAnswer: D
Which of the following did the network technician fail to do?
A network technician notices a router that repeatedly reboots. When contacting technical support, the technician discovers this is a known problem in which an attacker can craft packets and send them to the router through an obsolete protocol port, causing the router to reboot. Which of the following did the...