Users in a branch can access an in-house database server, but it is taking too long to fetch records. The
analyst does not know whether the issue is being caused by network latency. Which of the following will the
analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
A. SNMP B. Link state C. Syslog D. QoS E. Traffic shaping
After a critical power issue, the network team was not receiving UPS status notifications. The network team
would like to be alerted on these status changes. Which of the following would be BEST to use for these
notifications?
A technician is connecting a Cat 6 Ethernet cable to a device that only has LC ports. Which of the following will
the technician MOST likely use to accomplish this task?
A. A bridge B. A media converter C. A repeater D. A router
A systems operator is granted access to a monitoring application, configuration application, and timekeeping
application. The operator is denied access to the financial and project management applications by the
system's security configuration. Which of the following BEST describes the security principle in use?
A. Network access control B. Least privilege C. Multifactor authentication D. Separation of duties
A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is
configured with a DHCP reservation, but the address cannot be pinged from the print server in the same
subnet. Which of the following is MOST likely the cause of the connectivity failure?
A. Incorrect VLAN B. DNS failure C. DHCP scope exhaustion D. Incorrect gateway
A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting
process, the administrator performs a traceroute from the client to the server, and also from the server to
the client. While comparing the outputs, the administrator notes they show different hops between the hosts.
Which of the following BEST explains these findings?
A. Asymmetric routing B. A routing loop C. A switch loop D. An incorrect gateway
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 p.m. The
network administrator is concerned that this IP address will cause an issue to a critical server and would like to
deny the IP address at the edge of the network. Which of the following solutions would address these
concerns?
A. Changing the VLAN of the web server B. Changing the server's IP address C. Implementing an ACL D. Installing a rule on the firewall connected to the web server
When accessing corporate network resources, users are required to authenticate to each application they try to
access. Which of the following concepts does this BEST represent?
A. SSO B. Zero Trust C. VPN D. Role-based access control
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST
likely use to get detailed measurement data?
A. Packet capture B. iPerf C. NetFlow analyzer D. Internet speed test
A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company's network hardware.
The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.
The following settings are common to all network configurations:
Which of the following actions would MOST likely reduce this issue? (Choose two.) A. Change to WPA encryption. B. Change the DNS server to 10.1.10.1. C. Change the default gateway to 10.0.0.1. D. Change the DHCP scope end to 10.1.10.250. E. Disable AP isolation. F. Change the subnet mask to 255.255.255.192. G. Reduce the DHCP lease time to four hours.
Correct Answer: DG
Please disable your adblocker or whitelist this site!