Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A technician wants to have the ability to transfer files from home to the company’s network on a regular basis. Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?A . FTPB ....
Which of the following should the technician use to help diagnose the problem?
A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician's machine. Which of the following should the technician use to help diagnose the problem?A . Packet snifferB . netstatC . nslookupD . Spectrum analyzerView AnswerAnswer: A
Which of the following commands should a network administrator use to confirm the help desk technician's claim?
The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?A...
Which of the following should the network administrator do to harden the switch in this scenario?
A network administrator installed a multilayer switch In a shared closet. The network team will manage the switch remotely via SSH. Which of the following should the network administrator do to harden the switch in this scenario? (Select TWO).A . Disable TACACS+.B . Disable HTTP management.C . Configure the loopback.D...
Which of the following switch feature MUST be used to accomplish this?
A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?A . Spanning treeB . TrunkingC . Port aggregationD . Port mirroringView AnswerAnswer: D
To ensure proper functionality, which of the following ports should be allowed on the server’s local firewall?
A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server’s local firewall? (Select TWO).A . 20B . 21C . 53D . 67E . 68F . 389View AnswerAnswer: D,E
Which of the following records should the technician update to ensure email functions as expected?
A technician is configuring a new email server and needs to modify DNS records. Which of the following records should the technician update to ensure email functions as expected?A . MXB . CNAMEC . AAAAD . SRVView AnswerAnswer: A
Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?
A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?A . Change managementB . Network diagramsC . Inventory reportD . Labeling...
Which of the following should the technician attempt NEXT?
A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following...
Which of the following physical security devices is used to prevent unauthorized access into a datacenter?
Which of the following physical security devices is used to prevent unauthorized access into a datacenter?A . Motion detectorB . Video cameraC . Asset trackingD . Smart card readerView AnswerAnswer: D