Which of the following technologies should the technician consider using to accomplish this?
A network technician has been asked to create secure private networks between a company’s headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP . Which of the following technologies should the technician consider using to accomplish this?A . Site-to-siteB ....
Which of the following network components should the technician configure to point all clients on a network to a new DNS server?
A technician wants to configure a SOHO network to use a specific public DNS server . Which of the following network components should the technician configure to point all clients on a network to a new DNS server?A . RouterB . SwitchC . Load balancerD . Proxy serverView AnswerAnswer: A
Which of the following policies is being exercised?
A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed . Which of the following policies is being exercised?A . Privileged user agreementB . AUPC . Non-disclosure agreementD . OffboardingView AnswerAnswer: D
Which of the following is the MOST secure type of remote administration?
Which of the following is the MOST secure type of remote administration?A . SSH over iPSec client-to-site VPNB . RDP over SSLv2 HTTPS terminal services gatewayC . HTTP over WPA2-TKIP WiFiD . Telnet over PSTNView AnswerAnswer: A
Which of the following toots should the technician use to determine the last available network hop?
A network engineer is working on a network connectivity problem between a site in California and a site in New York. The connection went down overnight and the engineer is unsure where the connection failed. The technician is logged into the primary switch in the customer's network, which is also...
Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?
A network technician notices that switches of the same model have different commands and security features while administering them . Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?A . Change the default credentials.B...
Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?
The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?A . 802.1XB . 802.1qC . 802.3atD . 802.3afView AnswerAnswer: A
Which of the following technologies is used to attach multiple guest operating systems to a single physical network port?
Which of the following technologies is used to attach multiple guest operating systems to a single physical network port?A . Virtual switchB . FCoEC . VPCD . vSANE . Fibre ChannelView AnswerAnswer: A
Which of the following should the technician use to troubleshoot?
A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company's firewall . Which of the following should the technician use to troubleshoot?A ....
Which of the following is the BEST method to perform this?
A network technician needs to monitor the traffic going to a mission-critical server in the datacenter . Which of the following is the BEST method to perform this?A . Use port mirroringB . Install an inline tapC . Periodically view the server logsD . Configure port aggregationView AnswerAnswer: B