Which of the following would be used on a network to ensure access to resources if a critical host becomes una
Which of the following would be used on a network to ensure access to resources if a critical host
becomes unavailable?
Which of the following commands would be used to identify how many hops a data packet makes before reaching it
Which of the following commands would be used to identify how many hops a data packet makes
before reaching its final destination?
Which of the following commands can be used to clear this?
A technician suspects invalid information in the local DNS cache of a workstation. Which of the
following commands can be used to clear this?
Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?
Which of the following will allow a technician to monitor all network traffic when connected to a
mirror port?
Which of the following can be used to prioritize network streams to optimize performance for certain traffic t
Which of the following can be used to prioritize network streams to optimize performance for
certain traffic types?
Which of the following commands is used to check reverse DNS settings?
An administrator is attempting to troubleshoot a program that is unable to resolve IP addresses from
FQDNs. Which of the following commands is used to check reverse DNS settings?
Which of the following should the network administrator deploy to comply with the new collection requirements?
Due to a recent change in company policy, all users managing network infrastructure devices must
use SSH v2 and all administrative activity must be collected on a central store. Which of the
following should the network administrator deploy to comply with the new collection requirements?
Which of the following will allow the network administrator to quickly isolate the remote router…?
Users are reporting that some Internet websites are not accessible anymore. Which of the following
will allow the network administrator to quickly isolate the remote router that is causing the network
communication issue, so that the problem can be reported to the appropriate responsible party?
Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
A network technician is concerned that a user is utilizing a company PC for file sharing and using a
large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC
address of the user’s PC?
Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?
Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall
jack?