which of the following should the technician perform to…
A network technician is using telnet to connect to a router on a network that has been compromised. A new
user and password has been added to the router with full rights. The technician is concerned that the regularly
used administrator account has been compromised. After changing the password on all networking devices,
which of the following should the technician perform to prevent the password for the administrator account from
being sniffed on the network?
Which of the following features on the switch should th…
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to
be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which
of the following features on the switch should the network administrator use?
Which of the following technologies would be able to de…
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the
following technologies would be able to detect and block this traffic?
Which of the following cloud infrastructure designs inc…
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog
server that is hosted at a third party organization for review?
which of the followingattacks?
A network administrator receives a call asking for assistance with connecting to the network. The user asks for
the IP address, subnet class, and VLAN required to access the network. This describes which of the followingattacks?
Which of the following would the technician use to view…
A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which
of the following would the technician use to view the website and find the user browsing it?
which of the following network segments?
A network technician has created a network consisting of an external internet connection, a DMZ, an internal
private network, and an administrative network. All routers and switches should be configured to accept SSH
connections from which of the following network segments?
Which of the following would be the BEST addition to a …
Which of the following would be the BEST addition to a business continuity plan that would protect business
from a catastrophic event such as a fire, tornado, or earthquake?
Which of the following troubleshooting steps should the…
A network technician discovers an issue with spanning tree on the core switch. Which of the following
troubleshooting steps should the network technician perform NEXT to resolve the issue?
Which of the following should the network administrator…
A company has added several new employees, which has caused the network traffic to increase by 200%. The
network traffic increase from the new employees was only expected to be 20% to 30%. The administration
suspects that the network may have been compromised. Which of the following should the network
administrator have done previously to minimize the possibility of a network breach?