A customer wants to segregate the traffic between guests on a hypervisor. Which of the following does a technician need to configure to meet the requirement?
A.
Virtual switches
B.
OSPF routing
C.
Load balancers
D.
NIC teaming
E.
Fibre Channel
Virtual switches
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improveperformance for these applications?
A.
Link Aggregation Control Protocol
B.
Dynamic routing
C.
Quality of service
D.
Network load balancer
E.
Static IP addresses
Quality of service
An ITdirector is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications.In the event of an outage, the company can immediately switch from one datacenter to another. Which of the following does this BEST describe?
A.
A warm site
B.
Data mirroring
C.
Multipathing
D.
Load balancing
E.
A hot site
A hot site
A new cabling certification is being requested every time a network technician rebuilds one
end of a Cat 6 (vendor-certified)cable to create a crossover connection that is used to
connect switches. Which of the following would address this issue by allowing the use of
the original cable?
A.
CSMA/CD
B.
LACP
C.
PoE+
D.
MDIX
MDIX
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the followingshould the systems administrator select to meet this requirement?
A.
802.11ac
B.
802.11ax
C.
802.11g
D.
802.11n
802.11ax
A technician is installing a new fiber connection toa network device in a datacenter. The
connection from the device to the switch also traverses a patch panel connection. The
chain of connections is in the following order:
Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch panel
LC/LC patch cable
Switch
The connection is not working. The technician has changed both patch cables with known
working patch cables. The device had been tested and was working properly before being
installed. Which of the following is the MOST likely cause of the issue?
A.
TX/RX is reversed
B.
An incorrect cable was used
C.
The device failed during installation
D.
Attenuation is occurring
TX/RX is reversed
Which of the following would be BEST to use to detect a MAC spoofing attack?
A.
Internet Control MessageProtocol
B.
Reverse Address Resolution Protocol
C.
Dynamic Host Configuration Protocol
D.
Internet Message Access Protocol
Reverse Address Resolution Protocol
Wireless users are reporting intermittent internet connectivity. Connectivity is restored
when the users disconnect and reconnect, utilizing the web authentication process each
time. The network administrator can see the devices connected to the APs at all times.
Which of the following steps will MOST likelydetermine the cause of the issue?
A.
Verify the session time-out configuration on the captive portal settings
B.
Check for encryption protocol mismatch on the client’s wireless settings
C.
Confirm that a valid passphrase is being used during the web authentication
D.
Investigate for a client’s disassociation caused by an evil twin AP
Verify the session time-out configuration on the captive portal settings
Which of the following is MOST likely to generate significant East-West traffic in a
datacenter?
A.
A backup of a large video presentation to cloud storage for archival purposes
B.
A duplication of a hosted virtual server to another physical server for redundancy
C.
A download of navigation data to a portable device for offline access
D.
A query from an IoT device to a cloud-hosted server for a firmware update
A duplication of a hosted virtual server to another physical server for redundancy
An attacker is attempting to find the password to a network by inputting common words and
phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?
A.
Pass-the-hash attack
B.
Rainbow table attack
C.
Brute-force attack
D.
Dictionary attack
Dictionary attack
Explanation:
QUESTIONNO: 53
Which of the following technologies provides a failover mechanism for the default gateway?
A. FHRP
B. LACP
C. OSPF
D. STP
Answer: A
Which of the following routing protocols is used to exchange routeinformation between public autonomous systems?
A.
OSPF
B.
BGP
C.
EGRIP
D.
RIP
BGP
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which ofthe following switch features will MOST likely be used to assist with this task?
A.
Spanning Tree Protocol
B.
Discovery Protocol
C.
Link Aggregation Control Protocol
D.
Address Resolution Protocol
Discovery Protocol
Page 6 out of 17 Pages |
Previous |