Which of the following services could Lisa use in this scenario?
Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Lisa use in this scenario?
Which of the following is the MOST likely cause?
Karen, a new employee, is unable to get to the department’s server while other employees are
having no issues. The network administrator has verified that Karen has permission to the server
and the workstation is able to get to other network resources. Which of the following is the MOST
likely cause?
Which of the following settings on the switch will need to be configured to support the printer?
Kim, a network technician, is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch.
Which of the following settings on the switch will need to be configured to support the printer?
Which of the following is used to separate external untrusted hosts and internal trusted hosts?
Which of the following is used to separate external untrusted hosts and internal trusted hosts?
Which of the following could be used to determine if this is abnormally high traffic use?
Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?
what IPs are connecting to the server and in active mode?
A technician notices that the application servers resources are momentary at full capacity for the
amount of incoming and outgoing packets outside the LAN. Which of the following tools would be
used to find out what IPs are connecting to the server and in active mode?
Which of the following documents should Jeff use to attempt to discover the problem?
Jeff, a network technician, arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should Jeff use to attempt to discover the problem?
Which of the following would allow the technician to identify the last time an administrator was remotely conn
A server technician notices that some changes were implemented on a server during non-business hours. Which of the following would allow the technician to identify the last time an
administrator was remotely connected to the server?
Which of the following should she use?
Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each devices MIB. Which of the following should she use?
Which of the following would a server technician use before deploying an email server to mitigate already kno
Which of the following would a server technician use before deploying an email server to mitigate
already known security exploits on the operating system?