What does a router use when routes from different routing protocols exist for the same destination?, Shortest Path First, Administrative distance, Hop count, Latency, Users report that they cannot access any resources on the Internet using an FTP client. It is determined that the connections have been denied by the firewall. All hosts from the local subnet of 192.168.1.0/25 should have access. Which ACL rule should the company implement?, B. An inbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 22 and 23, D. An outbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 22 and 23, F. An outbound rule: permit hosts from 192.168.1.0 255.255.255.0 to access any hosts on TCP ports 20 and 21 не сокращай, E. An outbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21, C. An inbound rule: permit hosts from 192.168.1.0 255.255.255.0 to access any hosts on TCP ports 20 and 21, A. An inbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21, Which of the following is used to create point-to-multipoint tunnels by encapsulating Layer 2 traffic for transmission over a Layer 3 underlay network?, Quality of Service (QoS), Generic Routing Encapsulation (GRE), Switch Virtual Interface (SVI), Virtual extensible LAN (VXLAN), A company is replacing a portion of its wired LAN with a wireless LAN configured for Wi-Fi Protected Access II (WPA2). The company needs to use the most secure encryption protocol for WPA2. Which protocol should the company implement?, EAP-FAST, TKIP-RC4, CCMP-AES, EAP-TLS, A company’s network is shown in the exhibit. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do?, Deploy a DHCP relay agent in the 192.168.2.0 subnet., Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets., Configure IP exclusions for the 192.168.4.0 and 192.168.4.128 subnets., Open UDP port 53 on each of the routers., Users report that messages about duplicate IP addresses keep displaying on their computers. What should technicians suspect as a cause?, Name resolution errors, Exhausted DHCP scope, Rogue DHCP server, Host firewall settings, A network technician must ensure that nodes can send traps when performance thresholds are breached. Which solution BEST meets this requirement?, Deploy an SNMP management system and configure agents on nodes., Configure a syslog server and forward syslog information from nodes., Install IDS software on each network node and define performance alerts., Configure network nodes to synchronize with a centralized NTP server., What should a company use as an authentication and authorization server for WPA2-Enterprise?, Kerberos, LDAP, RADIUS, TACACS+, What is the first step when troubleshooting a network problem?, Establish a probable cause theory., Change the most obvious potential cause., Establish a plan of action., Identify the problem., A company runs call center services with 25 agents. Agents report that their softphones have random quality issues. Which performance parameter should be verified in the network?, C) The maximum of 150 ms of delay, D) The minimum bandwidth of 50 Mbps, A) The maximum of 10% of packet loss, B) The minimum frame size of 9 k, , Flow control, Duplex, MDI mode, Speed, A restaurant offers public Wi-Fi access to the Internet for its customers. A customer is prompted with a web page that requires the customer to agree to abide by use policies while connected. What is this an example of?, MAC address filtering, Captive portal, NAC, Multifactor authentication, Which is considered an exterior routing protocol?, Routing Information Protocol RIP (старий, простий, по кількості хопів), Border Gateway Protocol BGP (протокол між мережами / інтернет), Open Shortest Path First OSPF (внутрішній, знаходить найкоротший шлях)), Enhanced Interior Gateway Routing Protocol  EIGRP (Cisco, покращений внутрішній) , A network technician has confirmed that faulty DNS records are causing connection timeouts. Which step of the troubleshooting methodology should the technician take NEXT?, Verify system functionality, Establish an action plan, Document action taken, Establish a theory, A network administrator wants to ensure duplex mismatches are identified quickly. Which statistic should the administrator monitor?, Link state, Giants, CRC errors, Latency, A network technician wants to deploy a new virtual firewall. The firewall has to support three interfaces: G0/0, G0/1, and G0/2. What should the technician configure at the VM level for these interfaces?, vNIC, iSCSI, VLAN, Trunk, The marketing team uses a SaaS service to store raw video files. The team reports slow access to some resources on the SaaS platform. What should the network team do?, Verify the ACL on the firewall, Deploy a SAN network, Migrate all users to a PaaS solution, Check the bandwidth, Following a disaster, a network administrator is attempting to prioritize system restores. What should the admin do FIRST?, Check the RTO, Verify the RPO, Verify the MTBF, Check the MTTR, A network administrator prepares to install an outdoor WAP and determines EIRP is lower than the install requires. What should the administrator do to address this issue?, Decrease the WAP transmit power., Replace the antenna cables., Disable SSID broadcast., Reorient the WAP., Which is used with multimode fiber?, RJ45, SFP, 110 block, F-type, PC1 fails to receive an IP address in the network shown in the exhibit. What should be configured to fix the problem?, Port forwarding on Router 1, IP helper address on Router 2, Conditional forwarder on Router 1, Conditional forwarder on Router 2, DHCP option 66 on Router 1, IP helper address on Router 1, Where in a network architecture is STP MOST likely to be disabled?, Core layer, Distribution layer, Top-of-rack switch, Access layer, A technician creates a list of MAC addresses to allow on the network using MAC filtering. The technician realizes that despite this configuration, any device can still connect. What should the technician do?, Change the method to Blacklisting., Reboot the access point., Change the order of IDs., Enable MAC filtering globally., A company wants to implement an authentication and authorization solution for network devices that also directly supports device management. What should the company use?, Kerberos, TACACS+, SNMP, RADIUS, A switch is unable to learn the MAC address for VMs on a directly connected host. What should a network technician do to address this issue?, Define a default route for the VM host., Create static ARP entries on the switch., Create a PTR record for each VM., Create a static route that points to each VM., A network administrator must capture all north-south packets at line rate for long-term storage and analysis. Traffic flows should not be impeded or interrupted. Which is the BEST option for meeting this requirement?, B) Configure a port mirror., A) Configure an inline IPS., D) Deploy a L2 switch., C) Deploy a proxy server., A company wants to support multiple client computers running an application installed on a computer that runs Windows Server 2016. The clients should be able to take advantage of the memory and processor resources on the server. Each client will have a unique data set. Which technology should the company use?, VNC, SSH, RDP, VPN, PC1 is unable to access any resources in network B. What should the company do to fix the issue?, Change PC1 mask, Change PC1 IP, Change router mask, Change router IP, The computer will have a static IPv4 address. What should technicians use as the computer’s default gateway?, 192.168.1.129, 192.168.1.193, 192.168.1.1, 192.168.1.65, A network consultant determines that a company can improve its performance by implementing jumbo frames. The network is configured with 10/100/1000 switches, and all hosts are configured with Gigabit Ethernet network adapters. The network is wired with Cat 5e UTP cable. What must the company do to support jumbo frames?, Configure each switchport in dynamic auto mode., Enable STP on all switches., Increase the MTU to 9000., Replace the cable with Cat 6 UTP cable., Users connect to a network using wireless laptops and report intermittent access issues with a NAS server. The access point and the NAS server are connected to a switch using a 100 Mbps link. The status of the access point is shown in the exhibit. What should the support team do to fix the connectivity issue?, Change security to WPA2-AES., Install more access points., Change the IEEE mode to 802.11n., Enable SSID isolation., A technician is troubleshooting a faulty single-mode connection between two network switches. The technician has determined that the issue is with the cabling. What should the technician do to address this issue?, Ensure that the cables support transmissions at the 850 nm wavelength., Ensure that the cable classification is OM3 or OM4., Ensure that the cable core diameter is 9 microns., Ensure that the cables support transmissions at the 1300 nm wavelength., A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include:Users authenticate with a user ID and password. All communication between the server and client is encrypted. Open ports on the perimeter firewall are kept to a minimum. No certificate is required at the server or client. What should the company select as a solution? , FTP, TFTP, SFTP, FTPS, A company wants to connect a remote office using a satellite internet service. What should be the main concern for this deployment?, Compatibility, Attenuation, Latency, Availability, A company opens new warehouse space on its company campus. Network wiring for the warehouse is routed through a 110 punch block and patch panel. Wiring out to devices uses Cat 5e UTP cable. Several devices in the warehouse experience communication problems. After extensive testing, the problem is determined to be crosstalk. The company needs to correct the problem. Infrastructure changes should be kept to a minimum. What should the company do?, Replace the failing cables with Cat 6 cables., Replace the 110 punchdown block with a 66 punchdown block., Replace the failing cables with Cat 5e STP cables., Replace all cabling with fiber optic cable., A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company. What should the company use to help ensure this?, Change management, Service-level agreement (SLA), Acceptable Use Policy (AUP), Network configuration baselines, Standard operating procedures (SOP), A network engineer is troubleshooting a network performance issue. Which tool can the engineer use to view packet headers and content in ASCII or hex?, nmap, tcpdump, NetFlow, netstat, An office is configured with APs as shown in the exhibit. The office was originally configured with AP1 only, but the users farthest from the AP had problems connecting. There were also intermittent problems with bandwidth saturation. After installing AP2, users near the center of the office have trouble connecting and communicating and are experiencing latency problems. What should technicians do to correct the problem?, Change AP1 to channel 3., Uninstall AP2 and move AP1 to the center of the room., Change AP2 to channel 6., Change the SSID for AP2 to OfficeAP2., Move both APs to the center of the room., Network devices in one area of the office building experience communication problems. A cable tester shows that the signal on the RX pair is lower than expected. What is this an indication of?, Latency, Electromagnetic interference (EMI), Crosstalk, Attenuation, A company has deployed a new Microsoft Windows server behind a firewall. A systems administrator has been experiencing problems querying and modifying items in Active Directory from a remote location using an LDAP-based application. Which protocol should be allowed through the firewall?, TCP port 22, TCP port 636, UDP port 69, UDP port 53, TCP port 3389, Most of a company’s network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers, including command-line and graphic utilities. Some administrators are in remote offices. All trainers are in the main office. The administrators being trained log on and work locally from a Linux server. The trainer will connect to the Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer. Which remote connection technology should the trainers use?, RDP, SSH, Telnet, VNC, An organization plans a new 802.11 deployment. The organization wants to maximize performance by allowing simultaneous communication streams between clients and WAPs. Which should the organization deploy?, FHRP, MU-MIMO, LACP, GSM.

排行榜

视觉风格

选项

AI增强版:本活动包含AI生成的内容。了解更多信息。

切换模板

)
恢复自动保存: