which of the following layers of the OSI model is the p…
A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate
computers are showing an error message on the screen and are unable to communicate with other computers
in the same lab. The network administrator looks at the following output:
SRC MACSRC IPDST MACDST IP
00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:1200
05:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not using any
virtualization technology, at which of the following layers of the OSI model is the problem occurring?
which of the following layers does the problem reside?
When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple
frames contain errors. In which of the following layers does the problem reside? (Select TWO).
which of the following layers of the OSI model was the …
A network engineer is dispatched to an employee office to troubleshoot an issue with the employee’s laptop.
The employee is unable to connect to local and remote resources. The network engineer flips the laptop’s
wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue
resolved?
which of the following places of the OSI model would a …
When a client calls and describes a problem with a computer not being able to reach the Internet, in which of
the following places of the OSI model would a technician begin troubleshooting?
Which of the following WAN technologies is associated w…
Which of the following WAN technologies is associated with high latency?
Which of the following should be checked?
After repairing a computer infected with malware, a technician determines that the web browser fails to go to
the proper address for some sites. Which of the following should be checked?
Which of the following helps prevent routing loops?
Which of the following helps prevent routing loops?
Which of the following would be the result of this action?
A network technician is troubleshooting a problem at a remote site. It has been determined that the connection
from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects
the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface.
Which of the following would be the result of this action?
which the malicious user gained access to the switches?
Two weeks after installation, a network technician is now unable to log onto any of the newly installed company
switches. The technician suspects that a malicious user may have changed the switches’ settings before they
were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained
access to the switches?
Which of the following will resolve the issue?
A network administrator recently installed a web proxy server at a customer’s site. The following week, a
system administrator replaced the DNS server overnight. The next day, customers began having issues
accessing public websites. Which of the following will resolve the issue?