Which of the following should the network technician do to investigate this issue?
A user in the marketing department reports the email server is down. The user has not received email for more than 24 hours. Which of the following should the network technician do to investigate this issue?A . other users in the marketing department to see if they are also having...
Which of the following is the MOST likely cause of this issue?
A network engineer created a guest wireless network named "Visitor" for clients to use when they are on site. After a couple of months, visiting clients state they cannot access the Internet after connecting to the "Visitor" wireless network, even though configuration changes have not been made. Which of the...
Which of the following is used to define the duration during which a client can use an IP address?
Which of the following is used to define the duration during which a client can use an IP address?A . MAC reservationB . IP helperC . PoolD . Lease timeView AnswerAnswer: D
Which of the following should the technician use?
Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use?A . 3DES encryptionB . SSL certificateC . Digital signaturesD . MD5 hashView AnswerAnswer: D
Which of the following remote access methods should the technician use?
A network technician has provisioned a new Linux instance in public cloud provider’s IaaS environment. The technician did not install a graphical user interface. The technician wants to connect to the server’s public IP address securely to start a console session. Which of the following remote access methods should the...
Which of the following is the MOST likely issue?
A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the...
Which of the following policies is being exercised?
A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?A . Privileged user agreementB . AUPC . Non-disclosure agreementD . OffboardingView AnswerAnswer: D
Which of the following attacks are occurring in this scenario?
An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring...
Which of the following is the network range found in the ACL that could have affected this PC?
A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?A . 192.168.12.97 255.255.255.192B . 192.168.12.97 255.255.255.224C . 192.168.12.97...
Which of the following protocols should the technician disable to adhere to the company policy?
A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?A . HTTPB . TelnetC ....