Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the following can the administrator use to complete this task?

A.

IP Helper

B.

Reservation

C.

Exclusion

D.

Scope

Which of the following protocols uses the Dijkstra's Link State Algorithm to establish routes inside its routing table?

A.

OSPF

B.

EIGRP

C.

BGP

D.

RIP

A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?

A.

Mesh

B.

Infrastructure

C.

Ad hoc

D.

Point-to-point

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Which of the following can also provide a security feature when implemented?

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

A user calls the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

A.

Identify the problem.

B.

Establish a theory.

C.

Document findings.

D.

Create a plan of action.

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Which of the following network traffic type is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

A network administrator needs to ensure that users accept internet usage rules. Which of the following will help the administrator accomplish this task?

A.

Captive portal

B.

Acceptable use policy

C.

Network access control

D.

DNS filtering

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network