Which of the following should be included in a logical network diagram?

A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?A . Rack locationB . Room numberC . Media typeD . HostnameView AnswerAnswer: D

August 26, 2021 No Comments READ MORE +

Which of the following authentication methods would meet this requirement?

A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods...

August 26, 2021 No Comments READ MORE +

Which of the following devices should be used to accomplish this task?

To achieve a more efficient and secure work environment, a company needs a way to control what is being accessed on the Internet using corporate resources. Which of the following devices should be used to accomplish this task? (Choose two.)A . Proxy serverB . IDSC . Load balancerD . Content...

August 26, 2021 No Comments READ MORE +

Which of the following network connection types would BEST accomplish this task?

A SAN serves out storage to a company’s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?A . InfiniBandB . iSCSIC . Fibre ChannelD...

August 26, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause?

A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?A . Expired IP addressB . Exhausted dynamic scopeC . Misconfigured VLSMD...

August 26, 2021 No Comments READ MORE +

At which of the following layers of the OSI model does compression occur?

At which of the following layers of the OSI model does compression occur?A . SessionB . TransportC . Data linkD . PresentationView AnswerAnswer: D

August 25, 2021 No Comments READ MORE +

Which of the following tools should be used to do this?

Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this?A . tcp dumpB . digC . nmapD . netstatView AnswerAnswer: C

August 25, 2021 No Comments READ MORE +

Which of the following technologies should be configured on the OS to create the wireless connection?

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?A . Partial meshB . Ad hocC . RingD . BusView AnswerAnswer: B

August 25, 2021 No Comments READ MORE +

Which of the following should be configured on the load balancer to allow for a single destination?

To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?A . SIPB . PATC . NATD . VIPView AnswerAnswer: D

August 25, 2021 No Comments READ MORE +

Which of the following did the network technician fail to do?

A network technician notices a router that repeatedly reboots. When contacting technical support, the technician discovers this is a known problem in which an attacker can craft packets and send them to the router through an obsolete protocol port, causing the router to reboot. Which of the following did the...

August 25, 2021 No Comments READ MORE +