A network technician is troubleshooting a network issue for employees who have reported issues with speed
when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the
employees' building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the
following BEST explains the speed issue?
A. The connection type is not rated for that distance. B. A broadcast storm is occurring on the subnet. C. The cable run has interference on it. D. The connection should be made using a Cat 6 cable.
A network administrator views a network pcap and sees a packet containing the following:
Which of the following are the BEST ways for the administrator to secure this type of traffic? (Choose two.) A. Migrate the network to IPv6. B. Implement 802.1 X authentication. C. Set a private community string. D. Use SNMPv3. E. Incorporate SSL encryption. F. Utilize IPSec tunneling.
A network technician needs to ensure the company's external mail server can pass reverse lookup checks.
Which of the following records would the technician MOST likely configure?
A company needs to virtualize a replica of its internal physical network without changing the logical topology
and the way that devices behave and are managed. Which of the following technologies meets this
requirement?
An ISP is providing internet to a retail store and has terminated its point of connection using a standard Cat 6
pin-out. Which of the following terminations should the technician use when running a cable from the ISP's port
to the front desk?
An IT technician successfully connects to the corporate wireless network at a bank. While performing some
tests, the technician observes that the physical address of the DHCP server has changed even though the
network connection has not been lost. Which of the following would BEST explain this change?
A. Server upgrade B. Duplicate IP address C. Scope exhaustion D. Rogue server
An administrator would like to have two servers at different geographical locations provide fault tolerance and
high performance while appearing as one URL to users. Which of the following should the administrator
implement?
A. Load balancing B. Multipathing C. NIC teaming D. Warm site
A cafeteria is facing lawsuits related to criminal internet access that was made over its guest network. The
marketing team, however, insists on keeping the cafeteria's phone number as the wireless passphrase. Which
of the following actions would improve wireless security while accommodating the marketing team and
accepting the terms of use?
A. Setting WLAN security to use EAP-TLS B. Deploying a captive portal for user authentication C. Using geofencing to limit the area covered by the WLAN D. Configuring guest network isolation
A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which
of the following features should the engineer configure on the switch interface?
A. Port tagging B. Port security C. Port mirroring D. Port aggregation
Correct Answer: B
Please disable your adblocker or whitelist this site!