A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:
Which of the following metrics confirms there is a cabling issue? A. Last cleared B. Number of packets output C. CRCs D. Giants E. Multicasts
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
A. Coaxial B. Single-mode fiber C. Cat 6e D. Multimode fiber
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
A. Establish a plan of action to resolve the issue and identify potential effects B. Verify full system functionality and, if applicable, implement preventive measures C. Implement the solution or escalate as necessary D. Test the theory to determine the cause
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?
A. 255.255.128.0 B. 255.255.192.0 C. 255.255.240.0 D. 255.255.248.0
A network engineer performs the following tasks to increase server bandwidth:
– Connects two network cables from the server to a switch stack
– Configure LACP on the switchports
– Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?
A. Load balancing B. Multipathing C. NIC teaming D. Clustering
The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal B. Two-factor authentication C. Complex passwords D. Geofencing E. Role-based access F. Explicit deny
Correct Answer: BC
Please disable your adblocker or whitelist this site!