1.
A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. Which of the following options will help to quickly identify the switches connected to each port?
2.
The BEST way to secure the most vulnerable attack vector for a network is to:
3.
Which of the following encryption types would MOST likely be used for securing a client-to-server VPN connection?
4.
Host1's application generates a payload of 2500B of data and sends to Host2. When the application on Host2 receives the payload it will be:
5.
A technician is troubleshooting a desktop connectivity issue. The technician believes a static ARP may be causing the problem. Which of the following should the technician do NEXT according to the network troubleshooting methodology?
6.
An administrator notices an abnormally high level of network traffic from a server. Upon logging into the server, the administrator runs the following command: Which of the following should the administrator use to correlate the active connection with the running service?
7.
A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible, in the most cost effective manner. Which of the following devices would be MOST appropriate?
8.
A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to the company file server. Right now, any employee can upload and download files with basic system credentials. Which of the following would require additional credentials?
9.
A network technician replaced a faulty Ethernet cable. The technician replaced one side of the patch in the incorrect part of the patch panel. Within a few minutes, the technician was informed that users were experiencing slow or no Internet connectivity all over the building. A broadcast storm began. After removing the replacement cable, which of the following should the technician do NEXT?
10.
In a network that requires multilayer switches to use authentication via RADIUS/TACACS+, which of the following access control models will the switches need to utilize?