which of the following layers of the OSI model would MAC addressing be found?
In which of the following layers of the OSI model would MAC addressing be found?
Which of the following is a possible cause of the access issues?
Several users from the finance department report that they are able to access the Internet, but unableto
connect to their financial applications. The network technician is unable to ping the finance server. The
technician decides to check the switch and determines that Internet access is working. Which of the following
is a possible cause of the access issues?
Which of the following needs to be configured on the switch to separate the traffic?
A technician needs to ensure that traffic from a specific department is separated within several switches.
Which of the following needs to be configured on the switch to separate the traffic?
Which of the following would need to be configured to prevent any further attacks from that IP address?
Several users are reporting connectivity issues with their laptops. Upon further investigation, the network
technician identifies that their laptops have been attacked from a specific IP address outside of the network.
Which of the following would need to be configured to prevent any further attacks from that IP address?
Which of the following would MOST likely be configured on the firewall?
The company is setting up a new website that will be requiring a lot of interaction with external users. The
website needs to be accessible both externally and internally but without allowing access to internal resources.
Which of the following would MOST likely be configured on the firewall?
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from
a separate company server on the Internet?
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subn
Which of the following would be used to check whether a DoS attack is taking place from a specific remote
subnet?
Which of the following is MOST likely the problem?
A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match
other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The
previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
Which of the following isthe BEST choice?
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires
minimal in-house support. Which of the following isthe BEST choice?
Which of the following tools would appropriately diagnose the problem?
An unusual amount of activity is coming into one ofthe switches in an IDF. A malware attack is suspected.
Which of the following tools would appropriately diagnose the problem?