A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?
Which of the following types of routes takes precedence when building a routing table for a given subnet?
Which of the following tools uses ICMP to help determine whether a network host is reachable?
Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?
Which of the following is used to stage copies of a website closer to geographically dispersed users?
A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?
An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?
Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?
A network administrator needs to ensure all network ports use a security method that only permits authenticated devices. The solution must meet the following requirements:
• Reduced chance of spoofing
• Centrally managed solution
• Auditable logs
Which of the following technologies provides this functionality?
An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?
A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?
A network engineer configures a NIC that has an IP address of 192.168.123.232. Which of the following classes is this address an example of?
A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or stream training videos, they notice buffering issues. Which of the following is the most likely cause?
A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?