No student devices needed. Know more
12 questions
NO.269 A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?
(A). A honeypot
(B). Network segmentation
(C). Antivirus
(D). A screened subnet
NO.270 A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?
A) Disabling unneeded switchports
B) Changing the default VLAN
C) Configuring DHPC snooping
D) Writing ACLs to prevent access to the switch
NO.271 A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?
(A). Full backups
(B). Load balancing
(C). Hot site
(D). Snapshots
NO.272 Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of me following actions can reduce repair time?
(A). Using a tone generator and wire map to determine the fault location
(B). Using a multimeter to locate the fault point
(C). Using an OTDR In one end of the optic cable to get the liber length information
(D). Using a spectrum analyzer and comparing the current wavelength with a working baseline
NO.273 A network administrator is talking to different vendors about acquiring technology to support a new project for a large company. Which of the following documents will MOST likely need to be signed before information about the project is shared?
(A). BYOD policy
(B). NDA
(C). SLA
(D). MOU
NO.274 Which of the following policies is MOST commonly used for guest captive portals?
(A). AUP
(B). DLP
(C). BYOD
(D). NDA
NO.275 Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?
(A). Scope options
(B). Reservation
(C). Exclusion
(D). Relay
(E). Pool
NO.276 A technician needs to configure a routing protocol for an internet-facing edge router. Which of the following routing protocols will the technician MOST likely use?
(A). BGP
(B). RIPv2
(C). OSPF
(D). EIGRP
NO.277 After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes. Which of the following would be BEST to use tor these notifications?
(A). Traps
(B). MB
(C). NetFlow
(D). Syslog
NO.278 A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?
(A). Correct the DNS server entries in the DHCP scope
(B). Correct the external firewall gateway address
(C). Correct the NTP server settings on the clients
(D). Correct a TFTP Issue on the company's server
NO.279 A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port?
(A). IP route table
(B). VLAN tag
(C). MAC table
(D). QoS tag
NO.280 A city has hired a new employee who needs to be able to work when traveling at home and at the municipal sourcing of a neighboring city that snares services. The employee is issued a laptop, and a technician needs to train the employee on the appropriate solutions for secure access to the network from all the possible locations On which of the following solutions would the technician MOST likely train the employee?
A) Site-to-site VPNs between the two city lokations and client-to-site software on the employee`s laptop for all other remote access
B) Client-to-site VPNs between the travel lokations and site-to-site software on the employee`s laptop for all other remote access
C) Client-to-site VPNs between the two city lokations and site-to-site software on the employee`s laptop for all other remote access
D) Site-to-site VPNs between the home and city lokations and site-to-site software on the employee`s laptop for all other remote access
Explore all questions with a free account