Which of the following could be implemented to redirect…
A client is concerned about a hacker compromising a network in order to gain access to confidential research
data. Which of the following could be implemented to redirect any attackers on the network?
Which of the following should the technician implement …
Users have reported poor network performance. A technician suspects a user may have maliciously flooded
the network with ping request. Which of the following should the technician implement to avoid potential
occurrences from happening in the future?
which of the following is the BEST course of action for…
An additional network segment is urgently needed for QA testing on the external network. A software release
could be impacted id this change is not immediate. The request come directly from management, and there is
no time to go through the emergency change control process. Given this scenario, which of the following is the
BEST course of action for the network administrator to take?
Which of the following would work BEST to achieve these…
A company is installing several APs for a new wireless system that requires users to authenticate to the
domain. The network technician would like to authenticate to a central point. Which of the following would work
BEST to achieve these results?
which of the following?
A company plan established to resume normal system operations following a disruption in business would be
described as which of the following?
Which of the following allows a telecommunications comp…
Which of the following allows a telecommunications company to test circuits to customers remotely?
How many broadcast domains are present in this company’…
A company has a network with three switches, each one with eight ports. The switch is connected to a router
that has a hub with four computers plugged into one of its interfaces. How many broadcast domains are
present in this company’s network
Which of the following security techniques should be used?
A network technician needs to set up two public facing web servers and watns to ensure that if they are
compromised the intruder cannot access the intranet. Which of the following security techniques should be
used?
Which of the following protocols were designed to avoid…
Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO)
Which of the following needs to be rolled back?
Upon arrival at work an administrator is informed that network users cannot access the file server. The
administrator logs onto the server and sees that updates were automatically installed and the network
connection shows limited or no availability. Which of the following needs to be rolled back?