Which of the following should be implemented to allow remote users to access network resources while only redirecting necessary traffic?
A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer
use to upgrade the gateway?
A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not
labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?
A network administrator is getting reports of some internal users who cannot connect to network resources. The users slate they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks. Which of the following is the MOST likely cause of the issue?
Which of the following fouling protocols is generally used by major ISPs for handing large-scale internet traffic?
A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up?
A company, which is located in a coastal town, retrofitted an office building for a new data center. The underground fiber optics were brought in and connected to the switches in the basement network MDF. A server data center was built on the fifth floor with the two rooms vertically connected by fiber optics. Which of the following types of environmental sensors is MOST needed?
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?
Which of the following would a network administrator configure to set NTP settings for a specific subnet within DHCP?
A security team would like to use a system in an isolated network to record the actions of potential attackers. Which of the following solutions is the security team implementing?
A technician installed an 8-port switch in a user's office. The user needs to add a second computer in the office, so the technician connects both PCs to the switch and connects the switch to the wall jack. However, the new PC cannot connect to network resources. The technician then observes the following:
• The new computer does not get an IP address on the client's VLAN.
• Both computers have a link light on their NICs.
• The new PC appears to be operating normally except for the network issue.
• The existing computer operates normally.
Which of the following should the technician do NEXT to address the situation?
A network administrator is switching to IPv6 and wants to be able to use packet-tracing software on the network to monitor traffic. The administrator wants to set up the IP addressing to include the MAC address of each machine that is connected. Which of the following should the administrator implement? (Select two).
A network technician is working to deploy a new subnet to support 500 hosts. The technician needs to limit the number of unused IP addresses. Which of the following subnets should the technician choose?
Which of the following attacks utilizes a network packet that contains multiple network tags?