Which of the following would be the result of this action?
A network technician is troubleshooting a problem at a remote site. It has been determined that the connection
from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects
the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface.
Which of the following would be the result of this action?
Which of the following commands would the network techn…
A network technician has detected a personal computer that has been physically connected to the corporate
network. Which of the following commands would the network technician use to locate this unauthorized
computer and determine the interface it is connected to?
Which of the following meets these requirements?
A small company is developing a new Internet-facing web application. The security requirements are:
1. Users of the web application must be uniquely identified and authenticated.
2. Users of the web application will not be added to the company’s directory services.
3. Passwords must not be stored in the code.
Which of the following meets these requirements?
Which of the following commands would provide the BEST …
A network technician has received comments from several users that cannot reach a particular website. Which
of the following commands would provide the BEST information about the path taken across the network to this
website?
Which of the following components should be used to ach…
An educational institution would like to make computer labs available to remote students. The labs are used for
various IT networking, security, and programming courses. The requirements are:
1. Each lab must be on a separate network segment.
2. Labs must have access to the Internet, but not other lab networks.
3. Student devices must have network access, not simple access to hosts on the lab networks.
4. Students must have a private certificate installed before gaining access.
5. Servers must have a private certificate installed locally to provide assurance to the students.
6. All students must use the same VPN connection profile.
Which of the following components should be used to achieve the design in conjunction with directory services?
which of the following layers of the OSI model was the …
A network engineer is dispatched to an employee office to troubleshoot an issue with the employee’s laptop.
The employee is unable to connect to local and remote resources. The network engineer flips the laptop’s
wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue
resolved?
Which of the following is the reason for the computer i…
A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The
network engineer analyzes the following output from a command line utility:
Network Destination Netmask Gateway Interface
192.168.1.0 255.255.255.0 192.168.1.254 eth0
192.168.1.10 255.255.255.255 192.168.1.10 eth0
127.0.0.1 255.0.0.0 On-Link lo
127.0.0.0 255.0.0.0 On-Link lo
255.255.255.255 255.255.255.255 102.168.1.10 eth0
Which of the following is the reason for the computer issue, given the above output?
Which of the following is the MOST likely cause of the …
Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal
is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong
signal. Which of the following is the MOST likely cause of the issue?
Which of the following network devices use ACLs to prev…
Which of the following network devices use ACLs to prevent unauthorized access into company systems?
Which of the following has happened to the user?
A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers.
Which of the following has happened to the user?