Which of the following would resolve this issue?
The administrator’s network has OSPF for the internal routing protocol. One port going out to the
Internet is congested. The data is going out to the Internet, but queues up before sending. Which of
the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
Which of the following is the MOST likely mitigation for this reported item?
An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?
Which of the following procedures should the system administrator perform FIRST?
A system administrator wants to update a web-based application to the latest version. Which of the
following procedures should the system administrator perform FIRST?
Which of the following should be done to correct this issue?
Multiple students within a networking lab are required to simultaneously access a single switch
remotely. The administrator checks and confirms that the switch can be accessed using the console,
but currently only one student can log in at a time. Which of the following should be done to correct
this issue?
Which of the following should the technician install and configure on the laptops if the threat is network bas
A technician needs to install software onto company laptops to protect local running services, from
external threats. Which of the following should the technician install and configure on the laptops if
the threat is network based?
Which of the following physical security controls prevents an attacker from gaining access to a network closet
Which of the following physical security controls prevents an attacker from gaining access to a
network closet?
which of following threats?
A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
Which of the following would the technician MOST likely configure?
A technician is setting up a computer lab. Computers on the same subnet need to communicate with
each other using peer to peer communication. Which of the following would the technician MOST
likely configure?
Which of the following concepts are MOST important for a company’s long term health in the event of a di
Which of the following concepts are MOST important for a company’s long term health in the event
of a disaster? (Select TWO).
Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted?