Based on those requirements, which of the following should the network administrator use?

As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)A . OSPFB . IS-ISC . RIPv1D . BGPE ....

June 12, 2021 No Comments READ MORE +

Which of the following should current network performance be compared against to determine network anomalies?

Which of the following should current network performance be compared against to determine network anomalies?A . BaselineB . Traffic analysisC . Packet captureD . LogsView AnswerAnswer: A

June 12, 2021 No Comments READ MORE +

Which of the following should the network administrator do to rule out any problems at Layer 1?

A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following...

June 11, 2021 No Comments READ MORE +

Which of the following should the technician use to secure the connection?

A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?A . SSH in tunnel modeB . RDP set to console connectionC . EAP-PEAPD ....

June 11, 2021 No Comments READ MORE +

When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity?

A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)A . TCP 25B . TCP 110C . TCP 143D . TCP 389E . TCP 587F . TCP...

June 11, 2021 No Comments READ MORE +

Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?

A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?A . /24B . /25C . /30D . /32View AnswerAnswer: C

June 11, 2021 No Comments READ MORE +

Considering this, which of the following is the BEST way for the company to connect these networks?

In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company b uses the following scheme: Subnet 1: 192.168.1.50/28 The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the...

June 11, 2021 No Comments READ MORE +

Which of the following cloud models should the technician identify in the proposal?

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the...

June 11, 2021 No Comments READ MORE +

Which of the following indicates the correct IP address range?

A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?A . 172.16.80.0-172.16.85.254B . 172.16.80.0-172.16.88.255C . 172.16.80.1-172.16.87.254D . 172.16.80.1-172.16.85.255View AnswerAnswer: C

June 11, 2021 No Comments READ MORE +

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer.

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:A . ARP cache poisoningB . IP spoofingC . amplified DNS attackD . evil twinView AnswerAnswer: A

June 11, 2021 No Comments READ MORE +