CORRECT TEXT
CORRECT TEXT SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless...
Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?A . Ensure an implicit...
Which of the following should be adjusted to address the issue?
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?A . TTL B. MX C. TXT D. SOAView AnswerAnswer: A
Which of the following can the administrator perform to resolve the issue?
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?A . Install load balancers B. Install more switches C. Decrease the number...
Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?A . Password complexity B. Port security C. Wireless client isolation D. Secure SNMPView AnswerAnswer:...
Which of the following should a wireless technician do NEXT to troubleshoot this issue?
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a...
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?A . Replication traffic between an on-premises server and a remote backup facility B. Traffic between VMs running on different hosts C. Concurrent connections generated by Internet DDoS attacks D. VPN traffic from...
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?A . PaaS B. IaaS C. SaaS D. Disaster recovery as a Service (DRaaS)View AnswerAnswer: B
Which of the following is the physical topology for an Ethernet LAN?
Which of the following is the physical topology for an Ethernet LAN?A . Bus B. Ring C. Mesh D. StarView AnswerAnswer: D
Which of the following describes the reason why the events are not being received?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are...