Which of the following is the MOST likely cause?
A new monitoring device is installed in the network that uses ping to determine whether critical
network Internet routers are up. After three missing pings, the alarm reports the device is down. The
device is now constantly reporting alarms, yet there are no reported Internet problems from users.
Which of the following is the MOST likely cause?
Which of the following is the MOST likely reason?
A network technician configures a firewall to block only certain IP addresses from accessing the
Internet. All users are reporting that they are unable to access the Internet. Which of the following is
the MOST likely reason?
Which of the following protocols is used for remote management of devices?
Which of the following protocols is used for remote management of devices?
which of the following authentication techniques?
A DSL modem connects to the provider’s network using which of the following authentication
techniques?
Which of the following tools should be used?
A technician needs to test the length of a newly installed cable run because it is believed that it
exceeds the maximum specification length. Which of the following tools should be used?
Which of the following would be the MOST secure way to harden this wireless network?
A customer has not been using security on a wireless network and has recently received many
attacks through this vector. Which of the following would be the MOST secure way to harden this
wireless network?
which of the following?
Keeping an authoritative and timely record of network devices and their settings is a key activity of
which of the following?
Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?
Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?
Which of the following can be used to inspect ongoing network traffic?
A network administrator suspects an employee of using the company’s Internet connection to
download illegal content. Which of the following can be used to inspect ongoing network traffic?
Which of the following processes should be set up?
A technician is setting up a firewall on the network that would show a public IP address out to the
Internet and assign private IP addresses to users inside the network. Which of the following
processes should be set up?