Which of the following protocols should the technician use to increase speed and fault tolerance?
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?A . SIPB . BGPC . LACPD . LLDPView AnswerAnswer: C
Which of the following should be leveraged to complete this task?
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?A . IaaSB . PaaSC...
Which of the following should be added to allow the clients to connect?
Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?A . DHCP lease timeB . IP helperC . TTLD . DNS record typeView AnswerAnswer: B
Which of the following tools would allow the technician to view the handshake?
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of...
Which of the following physical network topologies was created?
A network technician has created a network that consists of a router, a firewall, a switch, and several PCs. Which of the following physical network topologies was created?A . StarB . MeshC . RingD . BusView AnswerAnswer: D
Which of the following should the technician use to determine which statistics are not in the normal range?
A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician use to determine which statistics are not in the normal range?A . Baseline reviewB . Vulnerability scanC . System life-cycle reportD . Archiving logsView AnswerAnswer: A
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?A . MAC address reservationB . Static IP addressC . IP address exclusionD . Custom DNS server entryView AnswerAnswer: A
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
Which of the following MUST be implemented to share metrics between routing protocols within the same router?A . Routing loopB . Routing tableC . Route redistributionD . Dynamic routesView AnswerAnswer: B
Which of the following is a vulnerable system designed to detect and log unauthorized access?
Which of the following is a vulnerable system designed to detect and log unauthorized access?A . SIEMB . HoneypotC . DMZD . Proxy serverView AnswerAnswer: B
Which of the following steps should the network technician take NEXT?
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?A . Test the possible solutionB . Question the usersC . Determine what has changedD . Document the theoryView AnswerAnswer: A