A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?
#391
Answer: A✅ Correct❌ Incorrect
A network administrator wants to update a geofencing policy to limit access to the corporate network based on location. Which of the following will the administrator most likely leverage?
#392
Answer: D✅ Correct❌ Incorrect
Which of the following used to store and deliver content to clients in a geographically distributed manner using edge servers?
#393
Answer: B✅ Correct❌ Incorrect
Which of the following connectors allows a singular QSFP transceiver to have several physical connections?
#394
Answer: D✅ Correct❌ Incorrect
An organization is concerned about rogue devices connecting to the network and wants the network team to implement a solution. Which of the following types of filtering should the network team use to address this concern?
#395
Answer: A✅ Correct❌ Incorrect
A network administrator is redesigning a wireless network in which corporate and guest users share a single SSID that is configured with WPA2 PSK. Which of the following capabilities should be configured in order to improve security?
#396
Answer: B✅ Correct❌ Incorrect
A network administrator is migrating the existing phone system to VoIP. The vendor requires a separate voice network for the phones to function. Which of the following technologies should the administrator use to allow for this configuration?
#397
Answer: A✅ Correct❌ Incorrect
Computer A cannot reach Computer B in this network:Which of the following will resolve the issue?
#398
Answer: C✅ Correct❌ Incorrect
Which of the following most directly secures sensitive information on a network?
#399
Answer: A✅ Correct❌ Incorrect
A user is unable to reach a website and wants to verify its IP information. Which of the following tools is used to resolve the authoritative server to its FQDN?
#400
Answer: C✅ Correct❌ Incorrect
Users in one building on the campus network report very slow network access. A network technician logs in to the router to see if there are any errors associated with traffic to and from that particular building. Which of the following commands will the technician most likely run?
#401
Answer: D✅ Correct❌ Incorrect
Which of the following is enforced through legislation?
#402
Answer: B✅ Correct❌ Incorrect
Which of the following actions should be taken as part of the first step of the troubleshooting methodology?
#403
Answer: B✅ Correct❌ Incorrect
After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery life. Which of the following should a technician recommend?
#404
Answer: A✅ Correct❌ Incorrect
While deploying a new fleet of computers on a DHCP network, a network administrator notices that new computers cannot connect to the internet. Which of the following is most likely the problem?
#405
Answer: B✅ Correct❌ Incorrect
A network technician is designing a LAN for a new facility. The company is expecting more than 300 devices to connect to the network. Which of the following masks will provide the most efficient subnet?
#406
Answer: C✅ Correct❌ Incorrect
A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10Gb connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?
#407
Answer: C✅ Correct❌ Incorrect
A technician is alarmed after noticing more than 5,000 CRCs on a switchport. Which of the following should the technician do next?
#408
Answer: C✅ Correct❌ Incorrect
A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?
#409
Answer: A✅ Correct❌ Incorrect
A network administrator needs to deploy a new wireless solution at a customer site. All external users must provide credentials before being granted access to the wireless solution. Which of the following would best meet the requirements of this installation?
#410
Answer: D✅ Correct❌ Incorrect
A network engineer adds a tunnel for a new branch network. Which of the following ensures that all data is encrypted inside the tunnel?
#411
Answer: A✅ Correct❌ Incorrect
Which of the following routing technologies uses an attribute list for path selection?
#412
Answer: A✅ Correct❌ Incorrect
A network administrator is configuring a subnet that needs to support 13 usable IP addresses. Which of the following subnet masks best meets this requirement?
#413
Answer: D✅ Correct❌ Incorrect
A systems administrator installs multiple web servers and intends to use the First Hop Redundancy Protocol to control routing to the servers. Which of the following types of IP addresses should the administrator use to support this routing approach?
#414
Answer: A✅ Correct❌ Incorrect
Which of the following is the best device to use to provide security and filtering between a private network and a public network?
#415
Answer: B✅ Correct❌ Incorrect
An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:Which of the following is most likely the cause of the issue?
#416
Answer: D✅ Correct❌ Incorrect
Which of the following should an installer orient a port-side exhaust to when installing equipment?
#417
Answer: C✅ Correct❌ Incorrect
Which of the following ports is a secure protocol?
#418
Answer: C✅ Correct❌ Incorrect
A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers’ credentials can be seen when they pay. Which of the following best explains this social engineering technique?
#419
Answer: A✅ Correct❌ Incorrect
Which of the following can protect network equipment from voltage variations?