Which of the following would be an appropriate suggestion to add to the plan?
A network technician is assisting the company with developing a new business continuity plan. Which of the following would be an appropriate suggestion to add to the plan?A . Build redundant links between core devicesB . Physically secure all network equipmentC . Maintain up-to-date configuration backupsD . Perform reoccurring vulnerability...
Which of the following should the network technician do NEXT?
Topic 4, Troubleshooting A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A . Establish a theory of probable cause.B . Document actions and findings.C . Determine next steps...
Which of the following is being monitored to trigger the alarm?
A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24: current value 9413587.54" Which of the following is being monitored to trigger the alarm?A . Speed and duplex mismatchB . Wireless channel utilizationC . Network device CPUD . Network device memoryE . Interface...
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?A . Quarantine networkB . Core networkC . Guest networkD . Wireless networkView AnswerAnswer: C Explanation: A...
Which of the following attacks is the user MOST likely using?
A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using?A . DNS poisoningB . ARP poisoningC . ReflectionD . SYN attackView AnswerAnswer: B Explanation: Address Resolution Protocol poisoning (ARP poisoning) is a form...
Which of the following monitoring tools should be used to locate possible outages?
Topic 2, Network operations A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages?A . Network analyzerB . Packet analyzerC . Protocol analyzerD . Network snifferView AnswerAnswer: A Explanation: A network analyzer is a useful...
Which of the following will secure traffic between a web browser and a website?
A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website?A . SSLB . DNSSECC . WPA2D . MTUView AnswerAnswer: A Explanation: Secure SocketsLayer (SSL) provides cryptography and reliability for upper layers (Layers 5C7) of...
Which of the following should be the FIRST question the helpdesk asks?
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?A . Does the...
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives?
Deny Any Trust to Any DMZ eq to Any A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only....
Which of the following has happened to the user?
A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user?A . The user is connected using the wrong channel.B . The user is connected to the wrong SSID . The user...