Which of the following will provide the BEST collection and presentation of this data?
A network administrator has been directed to present the network alerts from the past week to the company's executive staff . Which of the following will provide the BEST collection and presentation of this data?A . A port scan printoutB . A consolidated report of various network devicesC . A...
Which of the following should a wireless technician do NEXT to troubleshoot this issue?
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a...
Which of the following is MOST likely occurring?
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency . Which of the following is MOST likely occurring?A . Ethernet collisionsB ....
Which of the following does the technician need to verify?
A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options. The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working...
Which of the following describes the issue?
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...
Which of the following should be used in place of these devices to prevent future attacks?
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack . Which of the following should be used in place of these devices to prevent future attacks?A . A network tapB . A proxy...