Which of the following command-line tools would generate this output?
Given the following information: Which of the following command-line tools would generate this output?A . netstatB . arpC . digD . tracertView AnswerAnswer: D Explanation: Tracert is a command-line tool that traces the route of a packet from a source to a destination and displays the number of hops and...
Which of the following is MOST likely the cause of the desktop not connecting?
A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on...
Which of the following would be BEST for the technician to use to perform this task?
A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?A . RDPB . SSHC . FTPD . DNSView AnswerAnswer: A Explanation: RDP (Remote Desktop Protocol) is the best...
Which of the following will MOST likely replace all the company’s hubs?
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?A . A Layer 3 switchB . A proxy serverC . A NGFWD . A WLAN controllerView AnswerAnswer: A Explanation: A Layer 3 switch will likely...
Which of the following tools should the technician use to troubleshoot the issue?
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference...
Which of the following describes the reason why the events are not being received?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are...
Which of the following documents would BEST support this?
The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained. Which of the following documents would BEST support this?A . An incident response planB . A business continuity planC . A change management policyD . An acceptable use policyView AnswerAnswer:...
Which of the following policies should the network administrator implements to BEST mitigate this issue?
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portalB . Two-factor authenticationC . Complex passwordsD . GeofencingE . Role-based accessF . Explicit denyView...
Which of the following access methods would provide the BEST security for this new datacenter?
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?A . Virtual network computingB . Secure Socket ShellC . In-band...
Which of the following should the systems administrator select to meet this requirement?
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?A . 802.11acB . 802.11axC ....