A network is experiencing a number of CRC errors during normal network communication.
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
A network administrator walks into a datacenter and notices an unknown person is following closely.
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent? A. Evil twin B. Tailgating C. Piggybacking D. Shoulder surfing
Wireless users are reporting intermittent internet connectivity.
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue? A. Verify the session […]
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireles
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 […]
Which of the following would be BEST to use to detect a MAC spoofing attack?
Which of the following would be BEST to use to detect a MAC spoofing attack? A. Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access Protocol
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the late
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement? A. 802.11ac B. 802.11ax C. 802.11g D. 802.11n
A resource pool in a cloud tenant has 90 GB of memory and 120 cores.
A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would allow for the maximum number of two-core machines with equal memory? A. 30 VMs, 3GB of memory B. […]
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity? A. Patch management B. Hardening C. Scaling D. Log and event monitoring
A company recently experienced a power outage that lasted 30 minutes.
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST? A. Server power B. Rack power C. Switch power D. SAN power
A cloud architect is designing the VPCs for a new hybrid cloud deployment.
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following: High availability Horizontal auto-scaling 60 nodes peak capacity per region Five reserved network IP addresses per subnet /24 range Which of the following would BEST meet the above requirements? A. Create two /25 subnets in different regions. […]