Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?

A.

Implement DNS filtering.

B.

Update ACLs to only allow HTTPS.

C.

Configure new IPS hardware.

D.

Deploy 802.1X security features.

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

A.

NS

B.

SOA

C.

PTR

D.

CNAME

Which of the following devices can operate in multiple layers of the OSI model?

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers. Which of the following wireless encryption types is the most secure and compatible?

A.

WPA3

B.

WPA2

C.

WPA2/WPA3 mixed mode

D.

WPA/WPA2 mixed mode

Which of the following types of routes takes precedence when building a routing table for a given subnet?

A.

Static

B.

BGP

C.

OSPF

D.

Default

Which of the following allows a standard user to log in to multiple resources with one account?

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem