Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?
#451
Answer: C✅ Correct❌ Incorrect
Users in a company report that after walking from one room to another, wireless connectivity is lost. The SSID is available, but the users have to manually reconnect every time they change rooms. Which of the following is most likely the cause of this issue?
#452
Answer: D✅ Correct❌ Incorrect
A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?
#453
Answer: C✅ Correct❌ Incorrect
Which of the following is an example of a split-tunnel VPN?
#454
Answer: A✅ Correct❌ Incorrect
A company's VoIP phone connection is cutting in and out. A senior network engineer is recommending the implementation of a voice VLAN. Which of the following should be configured?
#455
Answer: A✅ Correct❌ Incorrect
During a VoIP call, a user notices inconsistent audio and logs an incident ticket. A network administrator notices inconsistent delays in arrival of the RTP packets. Which of the following troubleshooting tools should the network administrator use to determine the issue?
#456
Answer: B✅ Correct❌ Incorrect
An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?
#457
Answer: C✅ Correct❌ Incorrect
Which of the following tools uses ICMP to help determine whether a network host is reachable?
#458
Answer: D✅ Correct❌ Incorrect
Which of the following, in addition to a password, can be asked of a user for MFA?
#459
Answer: C✅ Correct❌ Incorrect
A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?
#460
Answer: A✅ Correct❌ Incorrect
A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?
#461
Answer: D✅ Correct❌ Incorrect
A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?
#462
Answer: D✅ Correct❌ Incorrect
A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator thinks the issue is related to the NTP. Which of the following should the administrator do next?
#463
Answer: D✅ Correct❌ Incorrect
Which of the following objectives does an evil twin achieve?
#464
Answer: B✅ Correct❌ Incorrect
Which of the following server types is responsible for IP address management for clients?
#465
Answer: C✅ Correct❌ Incorrect
Clients report that phones are down. The network technicians determine that PCs and printers are online. However, the phones display the message Searching for service. Which of the following should the technicians check first?
#466
Answer: B✅ Correct❌ Incorrect
Which of the following physical installation factors would be the most important when a network switch is installed in a sealed enclosure?
#467
Answer: C✅ Correct❌ Incorrect
A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?
#468
Answer: C✅ Correct❌ Incorrect
A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known good NIC. the host is still unable to connect to the network. Which of the following is causing the connection issue?
#469
Answer: A✅ Correct❌ Incorrect
A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of the following is causing the issue?
#470
Answer: C✅ Correct❌ Incorrect
A network administrator is creating a copy of network traffic for later analysis. The flow of traffic should not be changed. Which of the following will most directly accomplish this task?
#471
Answer: B✅ Correct❌ Incorrect
Which of the following will a router prioritize first in the route selection process?
#472
Answer: A✅ Correct❌ Incorrect
A technician configures a new printer and places it on the network. Which of the following is the best way to ensure the printer will always keep the same IP configuration?
#473
Answer: D✅ Correct❌ Incorrect
Which of the following record types does an IP-to-name lookup use in DNS?
#474
Answer: B✅ Correct❌ Incorrect
Which of the following is most closely associated with having a leased line to a public cloud provider?
#475
Answer: B✅ Correct❌ Incorrect
A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations to the switches:Which of the following is the state of the core-sw01 port-channel interfaces?
#476
Answer: D✅ Correct❌ Incorrect
A company is migrating a data center from on premises to the cloud. Which of the following tools will help maintain consistency, reliability, and efficiency of provisioning and management?
#477
Answer: A✅ Correct❌ Incorrect
A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following would the administrator most likely leverage?
#478
Answer: D✅ Correct❌ Incorrect
A network architect is implementing a VPN solution for remote workers. The architect wants to ensure that data transmitted through the VPN is protected from eavesdropping and tampering. Which of the following solutions meet these requirements?
#479
Answer: B✅ Correct❌ Incorrect
A user runs ifconfig on a PC and sees the following address information:The user then plugs a new device into the network and statically assigns it the address 192.168.1.255. The device does not work on the network. Which of the following explains the issue?