Which of the following describes the reason why the events are not being received?

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK- UPDOWN: Interface 1/1, changed state to down Severity 5 LINK- UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the...

May 9, 2022 No Comments READ MORE +

Which of the following ONS records works as an alias to another record?

Which of the following ONS records works as an alias to another record?A . AAAAB . CNAMEC . MXD . SOAView AnswerAnswer: B

May 9, 2022 No Comments READ MORE +

Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?A . CoaxialB . Single-mode fiberC . Cat 6eD . Multimode fiberView AnswerAnswer: A

May 8, 2022 No Comments READ MORE +

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch

SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: - The SSIDs need to be configured as CorpNet with a key of S3cr3t! - The wireless...

May 8, 2022 No Comments READ MORE +

Which of the following factors should be considered when evaluating a firewall to protect a datacenter's east-west traffic?

Which of the following factors should be considered when evaluating a firewall to protect a datacenter's east-west traffic?A . Replication traffic between an on-premises server and a remote backup facilityB . Traffic between VMs running on different hostsC . Concurrent connections generated by Internet DDoS attacksD . VPN traffic from...

May 8, 2022 No Comments READ MORE +

Which of the following is used to prioritize Internet usage per application and per user on the network?

SIMULATION You are tasked with verifying the following requirements are met in order to ensure networ1< security. Requirements: Datacenter - Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage - Provide a dedicated server to resolve IP addresses and hostnames correctly and handle...

May 7, 2022 No Comments READ MORE +

Which of the following tools should the technician use to troubleshoot the issue?

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference...

May 6, 2022 No Comments READ MORE +

Which of the following does this BEST describe?

An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company...

May 6, 2022 No Comments READ MORE +

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?A . Establish a plan of action to resolve the issue and identify potential effectsB . Verify full system functionality and, if applicable, implement preventive measuresC . Implement...

May 6, 2022 No Comments READ MORE +

Which of the following software tools would BEST assist the technician in completing this task?

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?A . IP scannerB . Terminal emulatorC . NetFlow analyzerD . Port scannerView AnswerAnswer: A

May 6, 2022 No Comments READ MORE +