Which of the following log files should the technician review to assist in troubleshooting these errors?
A user’s workstation is experiencing multiple errors when trying to open programs. Which of the
following log files should the technician review to assist in troubleshooting these errors?
Which of the following performance optimization methods would BEST alleviate network traffic?
An organization finds that most of the outgoing traffic on the network is directed at several Internet
sites viewed by multiple computers simultaneously. Which of the following performance
optimization methods would BEST alleviate network traffic?
Which of the following commands will provide an administrator with the number of hops a packet takes from host
Which of the following commands will provide an administrator with the number of hops a packet
takes from host to host?
Which of the following utilities can a technician use to determine if DNS is working?
A user’s computer is unable to access the Internet. Which of the following utilities can a technician
use to determine if DNS is working?
Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network
A security appliance is blocking a DDoS attack on the network. Which of the following logs would be
used to troubleshoot the traffic patterns trying to go across the network?
Which method is the BEST way to accomplish this?
A company is experiencing a denial of service attack and wants to identify the source IP address of
the attacker in real time. Which method is the BEST way to accomplish this?
Which of the following practices would save time in the future?
A technician is unable to easily trace physical connections within a network rack. Which of the
following practices would save time in the future?
Which of the following tools can be used to inspect this traffic?
A network technician has been asked to look into a report from the IDS to determine why traffic is
being sent from an internal FTP server to an external website. Which of the following tools can be
used to inspect this traffic?
what software is listening on that port?
An application is using port 2000 on a PC. Which of the following could an administrator do to
determine what software is listening on that port?
Which of the following could be used to collect that information?
Users are reporting a large decrease in network performance. After further investigation, the
network administrator notices large amounts of traffic coming from a specific IP address. The
network administrator needs to identify the payload of the network traffic. Which of the following
could be used to collect that information?