Which of the following would be an appropriate suggestion to add to the plan?

A network technician is assisting the company with developing a new business continuity plan. Which of the following would be an appropriate suggestion to add to the plan?A . Build redundant links between core devicesB . Physically secure all network equipmentC . Maintain up-to-date configuration backupsD . Perform reoccurring vulnerability...

November 2, 2018 No Comments READ MORE +

Which of the following should the network technician do NEXT?

Topic 4, Troubleshooting A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A . Establish a theory of probable cause.B . Document actions and findings.C . Determine next steps...

October 31, 2018 No Comments READ MORE +

Which of the following is being monitored to trigger the alarm?

A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24: current value 9413587.54" Which of the following is being monitored to trigger the alarm?A . Speed and duplex mismatchB . Wireless channel utilizationC . Network device CPUD . Network device memoryE . Interface...

October 31, 2018 No Comments READ MORE +

Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?

Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?A . Quarantine networkB . Core networkC . Guest networkD . Wireless networkView AnswerAnswer: C Explanation: A...

October 30, 2018 No Comments READ MORE +

Which of the following attacks is the user MOST likely using?

A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using?A . DNS poisoningB . ARP poisoningC . ReflectionD . SYN attackView AnswerAnswer: B Explanation: Address Resolution Protocol poisoning (ARP poisoning) is a form...

October 30, 2018 No Comments READ MORE +

Which of the following monitoring tools should be used to locate possible outages?

Topic 2, Network operations A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages?A . Network analyzerB . Packet analyzerC . Protocol analyzerD . Network snifferView AnswerAnswer: A Explanation: A network analyzer is a useful...

October 30, 2018 No Comments READ MORE +

Which of the following will secure traffic between a web browser and a website?

A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website?A . SSLB . DNSSECC . WPA2D . MTUView AnswerAnswer: A Explanation: Secure SocketsLayer (SSL) provides cryptography and reliability for upper layers (Layers 5C7) of...

October 29, 2018 No Comments READ MORE +

Which of the following should be the FIRST question the helpdesk asks?

A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?A . Does the...

October 28, 2018 No Comments READ MORE +

A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives?

Deny Any Trust to Any DMZ eq to Any A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only....

October 26, 2018 No Comments READ MORE +

Which of the following has happened to the user?

A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user?A . The user is connected using the wrong channel.B . The user is connected to the wrong SSID . The user...

October 24, 2018 No Comments READ MORE +