Which of the following ports is commonly used by VoIP phones?
A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery?
A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?
A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:
1 Must not use plaintext passwords
2 Must be certificate based
3. Must be vendor neutral
Which of the following methods should the engineer select?
Which of the following BEST describes hosting several businesses on the same physical infrastructure?
A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?
A network technician needs to install security updates on several switches on me company's network. The management team wants this completed as quickly and efficiently as possible. Which of the following should the technician do to perform the updates?
A company is being acquired by a large corporation. As part of the acquisition process, the company's address should now redirect clients to the corporate organization page. Which of the following DNS records needs to be created?
A network administrator would like 10 enable NetFlow on a Layer 3 switch but is concerned about how the feature may impact the switch. Which of the following metrics should the administrator graph using SNMP to BEST measure the feature's Impact?
A technician is implementing a new wireless network to serve guests at a local office. The network needs to provide Internet access but disallow associated stations from communicating with each other. Which of the following would BEST accomplish this requirement?
Given the following information:
Which of the following command-line tools would generate this output?
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?
Which of the following topologies requires me MOST connections when designing a network?
Which of the following topologies requites the MOST connections when designing a network?
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?
Which of the following uses the destination IP address to forward packets?
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?
You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:
The SSIDs need to be configured as CorpNet with a key of S3cr3t!
The wireless signals should not interfere with each other
The subnet the Access Points and switch are on should only support 30 devices maximum
The Access Points should be configured to only support TKIP clients at a maximum speed
Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
See explanation below.
On the first exhibit, the layout should be as follows
Access Point Name AP1
IP Address 192.168.1.3
SSID Broadcast yes
Exhibit 2 as follows
Access Point Name AP2
IP Address 192.168.1.4
SSID Broadcast yes
Exhibit 3 as follows
Access Point Name AP3
IP Address 192.168.1.5
SSID Broadcast yes
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?
A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?
A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect Which of the following describes the issue?
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
Given the following output:
Which of the following attacks is this MOST likely an example of?
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:
Which of the following metrics confirms there is a cabling issue?
Which of the following would be used to expedite MX record updates to authoritative NSs?
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:
LC/LC patch cable
Cross-connect fiber cable
LC/LC patch cable
The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would BEST describe this setup?
A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?