A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation.
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology this is an example of:A . a divide-and-conquer approachB . gathering informationC . a top-to-bottom approachD . Implementing a solutionView...
Which of the following should a network security administrator recommend to assist with detecting these activities?
A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems . Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring.B . Change the default...
Which of the following should the network administrator do to accomplish these requirements?
Allow devices to move to different switchports on the same VLAN Which of the following should the network administrator do to accomplish these requirements?A . Set up a reservation for each deviceB . Configure a static IP on each deviceC . Implement private VLANs for each deviceD . Use DHCP...
At which of the following OSI model layers would a technician find an IP header?
At which of the following OSI model layers would a technician find an IP header?A . Layer 1B . Layer 2C . Layer 3D . Layer 4View AnswerAnswer: C
Which of the following does a technician need to configure to meet the requirement?
A customer wants to segregate the traffic between guests on a hypervisor . Which of the following does a technician need to configure to meet the requirement?A . Virtual switchesB . OSPF routingC . Load balancersD . NIC teamingE . Fibre ChannelView AnswerAnswer: A
Which of the following metrics will MOST accurately show the underlying performance issues?
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay . Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usageB...
Which of the following is MOST likely the cause?
A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of...
Which of the following attacks encrypts user data and requires a proper backup implementation to recover?
Which of the following attacks encrypts user data and requires a proper backup implementation to recover?A . DDoSB . PhishingC . RansomwareD . MAC spoofingView AnswerAnswer: C
Which of the following can the administrator perform to resolve the issue?
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool . Which of the following can the administrator perform to resolve the issue?A . Install load balancersB . Install more switchesC . Decrease the...
With which of the following concepts is this technique MOST closely associated?
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?A . Insider threatB . War drivingC . Evil twinD . HoneypotView AnswerAnswer: D