A network technician is reviewing the interface counters on a router interface. The
technician is attempting to confirm a cable issue. Given the following information:
Which of the following metrics confirms there is a cablingissue?
A.
Last cleared
B.
Number of packets output
C.
CRCs
D.
Giants
E.
Multicasts
CRCs
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of thefiber link?
A.
OTDR
B.
Tone generator
C.
Fusion splicer
D.
Cable tester
E.
PoE injector
OTDR
You are tasked with verifying the following requirements are met in order to ensure network
security.
Requirements:
Datacenter
Ensure network is subnetted to allow all devices to communicate properly whileminimizing
address space usage
Provide a dedicated server to resolve IP addresses and hostnames correctly and handle
port 53 traffic
Building A
Ensure network is subnetted to allow all devices to communicate properly while minimizing
address space usage
Provide devices to support 5 additional different office users
Add an additional mobile user
Replace the Telnet server with a more secure solution
Screened subnet
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a server to handle external 80/443 traffic Provide a server to handle port 20/21 traffic
INSTRUCTIONS Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled. Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu. If at any time you would like to bring back the initial state of the simulation, please click the
Reset All button.
Answer: See explanation below.
Explanation:
Top left subnet – 206.208.134.0/28
Top right subnet – 10.72.63.0/28
Bottom subnet – 192.168.11.0/28
Screened Subnet devices – Web server, FTP server
Building A devices – SSH server top left, workstations on all 5 on the right, laptop on
bottom left
DataCenter devices – DNS server.
Within the realm of network security, Zero Trust:
A.
prevents attackers from moving laterally through a system.
B.
allows a server to communicate with outside networks without a firewall.
C.
block malicious software that is too new to be found in virus definitions.
D.
stops infected files from being downloaded via websites.
block malicious software that is too new to be found in virus definitions.
A Chief Information Officer (CIO) wants to improve the availability of a company's SQL database Which of the following technologies should be utilized to achieve maximum availability?
A.
Clustering
B.
Port aggregation
C.
NIC teaming
D.
Snapshots
NIC teaming
A company hired a technician to find all the devices connected within a network. Which of
the following software tools would BEST assist the technician in completing this task?
A.
IP scanner
B.
Terminal emulator
C.
NetFlow analyzer
D.
Port scanner
IP scanner
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
A.
Virtual network computing
B.
Secure Socket Shell
C.
In-band connection
D.
Site-to-site VPN
Site-to-site VPN
Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?
A.
Storage array
B.
Type 1 hypervisor
C.
Virtual machine
D.
Guest QS
Storage array
A technician is troubleshooting a workstation's network connectivity and wants to confirm
which switchport corresponds to the wall jack the PC is using Which of the following
concepts would BEST help the technician?
A.
Consistent labeling
B.
Change management
C.
Standard work instructions
D.
Inventory management
E.
Network baseline
Consistent labeling
A networkengineer is investigating reports of poor network performance. Upon reviewing a
device configuration, the engineer finds that duplex settings are mismatched on both ends.
Which of the following would be the MOST likely result of this finding?
A.
IncreasedCRC errors
B.
Increased giants and runts
C.
Increased switching loops
D.
Increased device temperature
IncreasedCRC errors
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?
A.
dig
B.
arp
C.
show interface
D.
hostname
dig
During the security audit of a financial firm the Chief Executive Officer (CEO) questions
why there are three employees who perform very distinct functions on the server. There is
an administrator for creating users another for assigning the users lo groups and a third
who is the only administrator to perform file rights assignment Which of the following
mitigation techniques is being applied'
A.
Privileged user accounts
B.
Role separation
C.
Container administration
D.
Job rotation
Role separation
Page 7 out of 17 Pages |
Previous |