Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
#421
Answer: A✅ Correct❌ Incorrect
A company uses a solution to rotate the password that engineers use to connect to critical systems. Which of the following best describes this solution?
#422
Answer: C✅ Correct❌ Incorrect
Which of the following is the best way to keep devices on during a loss of power?
#423
Answer: A✅ Correct❌ Incorrect
A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?
#424
Answer: C✅ Correct❌ Incorrect
A server administrator needs to add a record to the company’s DNS server to verify ownership of a web domain. The administrator has the record's name and value. Which of the following record types should the administrator use to add the record to the DNS server?
#425
Answer: A✅ Correct❌ Incorrect
A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:Which of the following should the technician do to identify the path to the server?
#426
Answer: A✅ Correct❌ Incorrect
A major natural disaster strikes a company's headquarters, causing significant destruction and data loss. The company needs to quickly recover and resume operations. Which of the following will a network administrator need to do first?
#427
Answer: A✅ Correct❌ Incorrect
After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue?
#428
Answer: A✅ Correct❌ Incorrect
After a recent corporate merger, a network administrator needs to build reference documentation on multivendor infrastructure. Which of the following protocols will provide the information?
#429
Answer: C✅ Correct❌ Incorrect
Which of the following steps of the troubleshooting methodology is most likely to involve talking to a user who opens a ticket?
#430
Answer: C✅ Correct❌ Incorrect
Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?
#431
Answer: A✅ Correct❌ Incorrect
A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department's shared drives but can access the internet. Which of the following is the most likely cause of this issue?
#432
Answer: C✅ Correct❌ Incorrect
A network administrator is hosting a local application on a Type 2 hypervisor, but the application only has accessibility to the host machine. Which of the following address types would the administrator most likely visit to access the application?
#433
Answer: B✅ Correct❌ Incorrect
A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?
#434
Answer: C✅ Correct❌ Incorrect
Which of the following remote connectivity methods is used when data and management traffic use the same network infrastructure?
#435
Answer: A✅ Correct❌ Incorrect
Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?
#436
Answer: B✅ Correct❌ Incorrect
Which of the following uses the longest prefix match to determine an exit interface?
#437
Answer: C✅ Correct❌ Incorrect
A network administrator needs to securely connect to an Ubuntu server for management purposes. Which of the following protocols will most likely address this requirement?
#438
Answer: D✅ Correct❌ Incorrect
Which of the following allows for interactive, secure remote management of a network infrastructure device?
#439
Answer: A✅ Correct❌ Incorrect
After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?
#440
Answer: A✅ Correct❌ Incorrect
During a security audit, a consulting firm notices inconsistencies between the documentation and the environment. Which of the following can keep a record of who made the changes and what the changes are?
#441
Answer: B✅ Correct❌ Incorrect
Which of the following describes a malicious application that takes advantage of a software flaw?
#442
Answer: C✅ Correct❌ Incorrect
Which of the following allows a standard user to log in to multiple resources with one account?
#443
Answer: D✅ Correct❌ Incorrect
Which of the following describes the capability of a cloud service to adjust resources on demand?
#444
Answer: A✅ Correct❌ Incorrect
A company’s Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?
#445
Answer: C✅ Correct❌ Incorrect
Which of the following connector types is most commonly associated with Wi-Fi antennas?
#446
Answer: A✅ Correct❌ Incorrect
An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?
#447
Answer: A✅ Correct❌ Incorrect
A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?
#448
Answer: A✅ Correct❌ Incorrect
A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?
#449
Answer: A✅ Correct❌ Incorrect
A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change? E. TTL