A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?
Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?
A network administrator needs to ensure that users accept internet usage rules. Which of the following will help the administrator accomplish this task?
After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?
A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?
Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?
A technician is implementing a new SD-WAN device with a default configuration. The technician receives a URL via email and connects the new device to the internet to complete the installation. Which of the following is this an example of?
A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?
Which of the following cable types allows the use of QSFP ports without requiring transceivers?
Which of the following is the best way to keep devices on during a loss of power?
A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?
Which of the following is the best way to reduce the likelihood of electrostatic discharge?
A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:
Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops
10.1.1.1 < 1 ms 2. * < 1 ms < 1 ms
k k
k kTraceroute completeWhich of the following should the technician do to identify the path to the server?
A user ' s desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following configurations is required?
An administrator is troubleshooting a Layer 3 communication issue between the web server and the database server. The administrator finds the following information:
Device
IP
Subnet
Gateway
Firewall
192.168.1.1
255.255.255.0
1.2.3.4
Web server
192.168.1.50
255.255.255.0
192.168.1.1
Database server
192.168.1.201
255.255.255.128
192.168.1.1
Which of the following corrects the communication issue?