Which of the following configurations exempts traffic to the internet from traversing a VPN?
#151
Answer: C✅ Correct❌ Incorrect
Which of the following ports creates a secure connection to a directory service?
#152
Answer: D✅ Correct❌ Incorrect
A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches.Which of the following best describes the issue?
#153
Answer: C✅ Correct❌ Incorrect
A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
#154
Answer: A✅ Correct❌ Incorrect
Which of the following protocols is used to route traffic on the public internet?
#155
Answer: A✅ Correct❌ Incorrect
Which of the following protocols provides remote access utilizing port 22?
#156
Answer: A✅ Correct❌ Incorrect
After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perform this testing?
#157
Answer: D✅ Correct❌ Incorrect
Which of the following attacks would most likely cause duplicate IP addresses in a network?
#158
Answer: A✅ Correct❌ Incorrect
An organization wants better network visibility. The organization's requirements include:• Multivendor/OS-monitoring capabilities• Real-time collection• Data correlationWhich of the following meets these requirements?
#159
Answer: B✅ Correct❌ Incorrect
An administrator is evaluating the use of authentication within SNMP. Which of the following is the most secure way of authenticating devices using only SNMP?
#160
Answer: B✅ Correct❌ Incorrect
A company has observed increased user traffic to gambling websites and would like to limit this behavior on work computers. Which of the following should the company most likely implement?
#161
Answer: B✅ Correct❌ Incorrect
Following a fire in a data center, the cabling was replaced. Soon after an administrator notices network issues. Which of the following are the most likely causes of the network issues?
#162
Answer: D✅ Correct❌ Incorrect
Cloud computing has the capability to meet increased and decreased demands for computing infrastructure for a short period of time. Which of the following best describes this characteristic?
#163
Answer: B✅ Correct❌ Incorrect
Which of the following can also provide a security feature when implemented?
#164
Answer: A✅ Correct❌ Incorrect
Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?
#165
Answer: A✅ Correct❌ Incorrect
Which of the following is most likely to work with an FC connection and offers more scalability?
#166
Answer: B✅ Correct❌ Incorrect
A company is moving to a hybrid cloud model. As part of this move the mail server will be moved to the cloud. The systems administrator needs to ensure the mail server continues to receive email. Which of the following types of DNS records should the systems administrator update?
#167
Answer: C✅ Correct❌ Incorrect
A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?
#168
Answer: B✅ Correct❌ Incorrect
A network administrator is expanding a network and wants to ensure no unauthorized redundant links are present. Which of the following should the administrator use to identify and block redundant links?
#169
Answer: B✅ Correct❌ Incorrect
A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?
#170
Answer: A✅ Correct❌ Incorrect
Which of the following would be violated if an employee accidentally deleted a customer's data?
#171
Answer: D✅ Correct❌ Incorrect
A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?
#172
Answer: D✅ Correct❌ Incorrect
A company recently acquired a number of sites and no documentation was provided. A network administrator needs to identify and document all of the digital assets in use. Which of the following is the best method for the administrator to use?
#173
Answer: D✅ Correct❌ Incorrect
A network administrator recently upgraded a wireless infrastructure with new APs. Users are reporting that, when stationary, the wireless connection drops and reconnects after 20 to 30 seconds. While reviewing the logs, the administrator notices that the APs are changing channels. Which of the following is the most likely reason for the service interruptions?
#174
Answer: A✅ Correct❌ Incorrect
A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?
#175
Answer: C✅ Correct❌ Incorrect
A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?
#176
Answer: A✅ Correct❌ Incorrect
A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR concepts does this describe?
#177
Answer: C✅ Correct❌ Incorrect
A security analyst wants to control internet access based on site reputation and categorization. The analyst needs a solution that does not require traffic flow changes. Which of the following solutions would most likely meet these requirements?
#178
Answer: B✅ Correct❌ Incorrect
A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?
#179
Answer: A✅ Correct❌ Incorrect
A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?