Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following would be violated if an employee accidentally deleted a customer's data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Which of the following should an installer orient a port-side exhaust to when installing equipment?

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route