Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:

Which of the following should the technician most likely do to resolve the issue?

A.

Disable automatic negotiation on Switch11.

B.

Modify Switch10 MTU value to 1500.

C.

Configure STP on both switches.

D.

Change the native VLAN on the ports.

Which of the following routing protocols uses an autonomous system number?

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host bits is required?

A.

One

B.

Two

C.

Three

D.

Four

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Which of the following OSI model layers manages the exchange of HTTP information?

A.

Session

B.

Data link

C.

Network

D.

Application

Which of the following best describes a characteristic of a DNS poisoning attack?

A.

DNS address records are edited and changed on a DNS server.

B.

An attacker sets up a malicious DNS server in place of a legitimate server.

C.

DNS client requests are intercepted and false responses are returned.

D.

False DNS records are injected into cache on a DNS server.