A network administrator redesigned the positioning of the APs to create adjacent areas of
wireless coverage. After project validation, some users still report poor connectivity when
their devices maintain an association to a distanced AP. Which of the following should the
network administrator check FIRST?
A.
Validate the roaming settings on the APs and WLAN clients
B.
Verify that the AP antenna type is correct for the new layout
C.
Check to see if MU-MIMO was properly activated on the APs
D.
Deactivate the 2.4GHz band on the APS
Validate the roaming settings on the APs and WLAN clients
A network technician is reviewing an upcoming project's requirements to implement laaS.
Which of the following should the technician consider?
A.
Software installation processes
B.
Type of database to be installed
C.
Operating system maintenance
D.
Server hardware requirements
Server hardware requirements
The following configuration is applied to a DHCP server connected to a VPNconcentrator:
There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without
any Issues. The remaining sales representatives cannot connect tothe VPN over the
course of the day. Which of the following can be done to resolve the issue without utilizing
additional resources?
A.
Decrease the lease duration
B.
Reboot the DHCP server
C.
Install a new VPN concentrator
D.
Configure a new router
Decrease the lease duration
A network technician is installing an analog desk phone for a new receptionist After running
a new phone line, the technician now needs to cnmp on a new connector. Which of the
following connectors would MOST likely be used in this case?
A.
DB9
B.
RJ11
C.
RJ45
D.
DB25
DB9
Which of the following can be used to centrally manage credentials for various types of
administrative privileges on configured network devices?
A.
SSO
B.
TACACS+
C.
Zero Trust
D.
Separation of duties
E.
Multifactor authentication
TACACS+
A network administrator is implementing OSPF on all of a company’s network devices.
Which of the following will MOST likely replace all the company’s hubs?
A.
A Layer 3 switch
B.
A proxy server
C.
A NGFW
D.
A WLAN controller
A Layer 3 switch
After the A record of a public website was updated, some visitors were unable to access
the website. Which of the following should be adjusted to address the issue?
A.
TTL
B.
MX
C.
TXT
D.
SOA
TTL
A network device is configured to send critical events to a syslog server; however, the
following alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
A.
The network device is not configured to log that level to the syslog server
B.
The network device was down and could not send the event
C.
The syslog server is not compatible with the network device
D.
The syslog server did not have the correct MIB loaded to receive the message
The network device is not configured to log that level to the syslog server
A network technician was troubleshooting an issue for a user who was being directed to
cloned websites that were stealing credentials. The URLs were correct for the websites but
an incorrect IP address was revealed when the technician used ping on the user's PC After
checking the is setting, the technician found the DNS server address was incorrect Which
of the following describes the issue?
A.
Rogue DHCP server
B.
Misconfigured HSRP
C.
DNS poisoning
D.
Exhausted IP scope
Exhausted IP scope
A city has hired a new employee who needs to be able to work when traveling at home and
at the municipal sourcing of a neighboring city that snares services. The employee is
issued a laptop, and a technician needs to train the employee on the appropriate solutions
for secure access to the network from all the possible locations On which of the following
solutions would the technician MOST likely train the employee?
A.
Site-to-site VPNs between the two city locations and client-to-site software on the
employee's laptop tor all other remote access
B.
Client-to-site VPNs between the travel locations and site-to-site software on the
employee's laptop for all other remote access
C.
Client-to-site VPNs between the two city locations and site-to-site software on the
employee's laptop for all other remote access
D.
Site-to-site VPNs between the home and city locations and site-to-site software on the
employee's laptop for all other remote access
Site-to-site VPNs between the two city locations and client-to-site software on the
employee's laptop tor all other remote access
Access to a datacenter should be individually recorded by a card reader even when
multiple employees enter the facility at the same time. Which of the following allowsthe
enforcement of this policy?
A.
Motion detection
B.
Access control vestibules
C.
Smart lockers
D.
Cameras
Access control vestibules
Which of thefollowing DNS records works as an alias to another record?
A.
AAAA
B.
CNAME
C.
MX
D.
SOA
CNAME
Page 3 out of 17 Pages |
Previous |