Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Which of the following devices can operate in multiple layers of the OSI model?

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Which of the following allows for the interception of traffic between the source and destination?

A.

Self-signed certificate

B.

VLAN hopping

C.

On-path attack

D.

Phishing

Which of the following should an installer orient a port-side exhaust to when installing equipment?

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

A.

Band steering

B.

Wireless LAN controller

C.

Directional antenna

D.

Autonomous access point