Which of the following should be imported into the monitoring system to describe these object identifiers?
When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions . Which of the following should be imported into the monitoring system to describe these object identifiers?A . SNMPv3B . SIEMC . MIBD . SYSLOGView AnswerAnswer: C
Which of the following should the technician do to fix the AP connectivity issue?
A WAP has been dropping off the network sporadically and reconnecting shortly thereafter. The Cat5 wire connecting the access point is a long run of 265ft (81m) and goes through the business area and the mechanical room . Which of the following should the technician do to fix the AP...
Which of the following commands would MOST likely be used to further troubleshoot?
A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet . Which of the following commands would MOST likely be used to further troubleshoot?A . tracertB ....
Which of the following should be the NEXT step to attempt to harden the device?
Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins . Which of the following should be the...
Which of the following would reduce the number of devices in this configuration?
An administrator is redesigning a company's network and wants to reduce the amount of hardware needed Currently, all VLAN routing goes out a single switch interface to a router . Which of the following would reduce the number of devices in this configuration?A . BridgeB . Multilayer switchC . SwitchD...
Which of the following BEST describes the type of cloud architecture being used?
A company runs Linux servers in its own datacenter and also on a popular public cloud service provider. The servers hosted by the cloud provider can only be accessed with proper authorization and are only accessed by the company’s datacenter . Which of the following BEST describes the type of...
Which of the following is MOST likley the cause?
Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another . Which of the following is MOST likley the cause?A . Duplex/speed mismatchB . ACL misconfigurationC . Bad portD . CrosstalkView AnswerAnswer: B
Which of the following protocols is used to transport outgoing mail across networks?
Which of the following protocols is used to transport outgoing mail across networks?A . POPB . SMTPC . IMAPD . LDAPView AnswerAnswer: B
Which of the following is created on a 48-port switch with five active VLANs?
Which of the following is created on a 48-port switch with five active VLANs?A . 48 networks, five segmentsB . 48 collision domains, five broadcast domainsC . 240 private networksD . 240 usable IP addressesView AnswerAnswer: B
Which of the following technologies should be used in high-throughput networks to reduce network overhead?
Which of the following technologies should be used in high-throughput networks to reduce network overhead?A . iscsiB . QoStagsC . Port aggregationD . Jumbo framesView AnswerAnswer: D