A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST
help the administrator accomplish this task?
A
Which of the following is the physical topology for an Ethernet LAN?
D
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the
network?
D
The network administrator is informed that a users email password is frequently hacked by brute-force programs. Which of
the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
B C
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of
the following ports should be blocked when checking firewall configuration?
B
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2
switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of
the following is MOST likely occurring?
C
Which of the following DNS records works as an alias to another record?
B
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to
prevent network stability issues?
B
A network administrator is configuring a load balancer for two systems. Which of the following must the administrator
configure to ensure connectivity during a failover?
A
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light.
According to troubleshooting methodology, this is an example of:
D