Which of the following can the administrator perform to resolve the issue?
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?A . Install load balancersB . Install more switchesC . Decrease the number...
Which of the following is used to track and document various types of known vulnerabilities?
Which of the following is used to track and document various types of known vulnerabilities?A . CVEB . Penetration testingC . Zero-dayD . SIEME . Least privilegeView AnswerAnswer: A
Which of the following technologies BEST meets the organization's requirements?
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization's requirements?A . Load balancingB . GeofencingC . Public cloudD . Content delivery networkE . Infrastructure as a serviceView AnswerAnswer: D
Which of the following should the technician review on the switch to locate the device's network port?
A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port?A . IP route tableB . VLAN tagC . MAC tableD . QoS tagView...
Which of the following metrics will MOST accurately show the underlying performance issues?
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usageB ....
Which of the following metrics should the technician check to begin troubleshooting the issue?
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?A . Audit logsB . CPU utilizationC . CRC errorsD . JitterView AnswerAnswer: B
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?A . FirewallB . APC . Proxy serverD . IDSView AnswerAnswer: D
Which of the following can the administrator do to MOST easily mitigate this issue?
A network administrator discovers that users in an adjacent building are connecting to the company's guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levelsB . Adjust the wireless channelsC . Enable wireless...
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G ....
Which of the following would be BEST to use to detect a IMIAC spoofing attack?
Which of the following would be BEST to use to detect a IMIAC spoofing attack?A . Internet Control Message ProtocolB . Reverse Address Resolution ProtocolC . Dynamic Host Configuration ProtocolD . Internet Message A ccess ProtocolView AnswerAnswer: B