Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?A . SSOB . TACACS+C . Zero TrustD . Separation of dutiesE . Multifactor authenticationView AnswerAnswer: B
Which of the following describes the reason why the events are not being received?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are...
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?A . NetworkB . Data linkC . TransportD . SessionView AnswerAnswer: C
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G ....
To which of the following addresses should the software be configured to send the query?
A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?A . 10.1.2.0B . 10.1.2.1C . 10.1.2.23D . 10.1.2.255E . 10.1.2.31View AnswerAnswer:...
Which of the following attack types BEST describes this action?
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt . Which of the following attack types BEST describes this action?A . Pass-the-hash attackB . Rainbow table attackC . Brute-force attackD . Dictionary attackView AnswerAnswer: D
Which of the following ports should be blocked when checking firewall configuration?
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter . Which of the following ports should be blocked when checking firewall configuration?A . 22B . 23C . 80D . 3389E . 8080View AnswerAnswer: B
Which of the following switch features will MOST likely be used to assist with this task?
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment . Which of the following switch features will MOST likely be used to assist with this task?A . Spanning Tree ProtocolB . Neighbor Discovery ProtocolC . Link Aggregation...
Which of the following should the technician utilize for the switch?
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch . Which of the following should the technician utilize for the switch?A . MIBB . TrapC...
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?A . NIC teamingB . Load balancerC . RAID arrayD . PDUsView AnswerAnswer: A