Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the following can the administrator use to complete this task?

A.

IP Helper

B.

Reservation

C.

Exclusion

D.

Scope

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

A.

arp

B.

tracert

C.

nmap

D.

ipconfig

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

A.

netstat

B.

nslookup

C.

ping

D.

tracert

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

A.

GRE

B.

IKE

C.

ESP

D.

AH

Which of the following protocols provides remote access utilizing port 22?

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Which of the following IP transmission types encrypts all of the transmitted data?

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP