Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Which of the following is the next step to take after successfully testing a root cause theory?

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Which of the following is the most likely benefit of installing server equipment in a rack?

A.

Simplified troubleshooting process

B.

Decreased power consumption

C.

Improved network performance

D.

Increased compute density

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

Which of the following allows for interactive, secure remote management of a network infrastructure device?

A.

SSH

B.

VNC

C.

RDP

D.

SNMP

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Which of the following describes the best reason for using BGP?

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch