A network administrator needs to connect a multimode fiber cable from the MDF to the server room. The administrator connects the cable to Switch 2, but there is no link light. The administrator tests the fiber and finds it does not have any issues. Swapping the connection to Switch 1 in a working port is successful, but the swapped connection does not work on Switch 2. Which of the following should the administrator verify next?
Which of the following protocols uses the Dijkstra's Link State Algorithm to establish routes inside its routing table?
Which of the following attacks utilizes a network packet that contains multiple network tags?
Which of the following protocols has a default administrative distance value of 90?
Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?
A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?
Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?
A company's network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the following should a network technician implement to reduce the network congestion and improve performance?
A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?