Which of the following BEST describes these actions?
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location,
the user of the device and when the device was reassigned. Which of the following BEST describes these actions?
Which of the following will be needed after the server …
The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to
the domain?
Which of the following would resolve this issue?
The administrator’s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but
queues up before sending. Which of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
Which of the following is being monitored to trigger th…
A network technician receives the following alert from a network device:
“High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54”
Which of the following is being monitored to trigger the alarm?
which of the following?
It has been determined by network operations that there is a severe bottleneck on the company’s mesh topology network. The field technician has chosen to use log
management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?
Which of the following should the technician implement …
A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an
accurate comparison?
Which of the following systems should be used?
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be
used?
Which of the following should be implemented to ensure …
Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented
to ensure the network administrator can review device error information from one central location?
Which of the following technologies will be used to enc…
A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames?
Which of the following will allow the company to contin…
A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the
event that a WAN circuit at one site goes down?