Which of the following is the best next step to ensure security?

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?A . Apply the latest patches and bug fixes.B . Decommission and replace the switch.C . Ensure the current firmware has no issues.D . Isolate the switch from the network.View AnswerAnswer:...

April 10, 2025 No Comments READ MORE +

Which of the following would fulfill this requirement?

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?A . Jumbo framesB . 802.1Q taggingC . Native VLAND . Link aggregationView AnswerAnswer: B Explanation:

April 10, 2025 No Comments READ MORE +

Which of the following should a technician try first to troubleshoot this issue?

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?A . Reverse...

April 8, 2025 No Comments READ MORE +

Which of the following routing protocols uses an autonomous system number?

Which of the following routing protocols uses an autonomous system number?A . IS-ISB . EIGRPC . OSPFD . BGPView AnswerAnswer: D Explanation: BGP (Border Gateway Protocol) uses an Autonomous System (AS) number for its operations. An AS is a collection of IP networks and routers under the control of a...

April 3, 2025 No Comments READ MORE +

Which of the following subnet masks should the administrator use?

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?A . 255.255.0.0B . 255.255.254.0C . 255.255.255.0D . 255.255.255.128View AnswerAnswer: D Explanation: Understanding Subnetting: Original Network: 192.168.1.0/24 has a subnet mask of 255.255.255.0, which allows for 256 IP addresses (including...

April 3, 2025 No Comments READ MORE +

Which of the following is the next step to take after successfully testing a root cause theory?

Which of the following is the next step to take after successfully testing a root cause theory?A . Determine resolution steps.B . Duplicate the problem in a lab.C . Present the theory for approval.D . Implement the solution to the problem.View AnswerAnswer: A Explanation: Troubleshooting Methodology: Confirming the Root Cause:...

April 2, 2025 No Comments READ MORE +

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?A . DNS poisoningB . Denial-of-serviceC . Social engineeringD . ARP spoofingView AnswerAnswer: A Explanation: Network segmentation involves dividing a network into smaller segments or subnets. This...

April 1, 2025 No Comments READ MORE +

Which of the following is the best security feature to accomplish this task?

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?A . 802.1XB . Access control listC . Port securityD . MAC...

March 31, 2025 No Comments READ MORE +

Which of the following needs to be done on the port to address the issue?

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?A . Trunk all VLANs on the port.B . Configure the native VLAN.C . Tag the traffic to voice VLAN.D . Disable VLANs.View...

March 26, 2025 No Comments READ MORE +

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Which of the following is a cost-effective advantage of a split-tunnel VPN?A . Web traffic is filtered through a web filter.B . More bandwidth is required on the company's internet connection.C . Monitoring detects insecure machines on the company’s network.D . Cloud-based traffic flows outside of the company's network.View AnswerAnswer:...

March 24, 2025 No Comments READ MORE +