<< Prev Question Next Question >>

Question 113/492

A firewall technician has received calls stating the network is running slowly. The technician has found the firewall is functioning properly.
Which of the following should the technician review to determine the cause of the slow performance?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (492q)
Question 1: A technician is tasked with troubleshooting a network's slow...
Question 2: Which of the following describes a design where traffic is s...
Question 3: A technician needs to ensure green space wireless coverage. ...
Question 4: A network administrator is assigned an approved change reque...
Question 5: A network technician is trying to terminate CAT5 modular jac...
Question 6: An administrator is receiving reports from an executive that...
Question 7: Which of the following MUST be kept synchronized in order fo...
Question 8: Zach, a technician, is installing an 802.11n network. Which ...
Question 9: A network technician needs to identify active services that ...
Question 10: Which of the following could be used to stop unknown threats...
Question 11: A technician uses a cable tester to verify the pinout in an ...
Question 12: A user reports slow performance. A technician troubleshootin...
Question 13: A network administrator has determined the ingress and egres...
Question 14: After receiving an IP lease from a DHCP server, when will a ...
Question 15: DRAG DROP Wireless network users recently began experiencing...
Question 16: A software company is meeting with a car manufactures to fin...
Question 17: Which of the following layers of the OSI model is between th...
Question 18: A network technician needs to implement an Ethernet network ...
Question 19: Kim, a network administrator, is seeing workstations in buil...
Question 20: At which of the following layers of the OSI model do packets...
Question 21: A technician needs to verify an Ethernet run is functioning ...
Question 22: A network administrator is configuring an ACL that blocks al...
Question 23: A technician suspects that the email system is slow due to e...
Question 24: A home user is configuring a wireless router and must decide...
Question 25: Which of the following BEST describes how a layer 2 switch f...
Question 26: A technician is concerned about security and is asked to set...
Question 27: Two WAPs are positioned with overlapping coverage, but seaml...
Question 28: A network technician has just received an email regarding a ...
Question 29: A network technician wants to allow HTTP traffic through a s...
Question 30: A technician needs to add new features to existing hardware ...
Question 31: An administrator notices an abnormally high level of network...
Question 32: Which of the following describes a DNS server?...
Question 33: Which of the following attacks utilizes a wireless access po...
Question 34: Jeff, a network technician, is installing a wireless router....
Question 35: A network technician configures a firewall's ACL to allow ou...
Question 36: A user snapped the retention tab off of a network cable. Whi...
Question 37: A company has implemented a major network upgrade, replacing...
Question 38: A network technician has received reports of an Internet-bas...
Question 39: An employee of a highly secure company needs to use facial r...
Question 40: Which of the following DNS records allows for reverse lookup...
Question 41: A client needs a cloud solution that allows quick provisioni...
Question 42: Workers in a company branch office are required to click on ...
Question 43: Joe, a network administrator, has installed an SFTP server b...
Question 44: A penetration tester has been tasked with reconnaissance to ...
Question 45: In order to reduce spam email, Kim, a network administrator,...
Question 46: Lisa, an administrator, has set up an 802.11n wireless netwo...
Question 47: A user has installed a new wireless printer. The user cannot...
Question 48: A user is experiencing issues with home WiFi cutting out spo...
Question 49: Which of the following protocols are used to connect devices...
Question 50: Which of the following ports should be allowed through a fir...
Question 51: When a criminal or government investigation is underway, whi...
Question 52: Which of the following default ports would need to be open o...
Question 53: A company would like all HTTP traffic to filter through a pr...
Question 54: A network technician needs to connect two switches. The tech...
Question 55: A network administrator is trouble shooting a connectivity i...
Question 56: A small office has an Internet connection that drops out abo...
Question 57: Which of the following would Kim, a technician, do to monito...
Question 58: An administrator is setting up a secure wireless network. Th...
Question 59: A computer on VLAN 10 with the IP address of 192.168.1.45/27...
Question 60: A company has decided to upgrade its legacy phone system to ...
Question 61: A network administrator wants to logically separate web func...
Question 62: A technician is troubleshooting a desktop connectivity issue...
Question 63: Which of the following encryption types would MOST likely be...
Question 64: A disgruntled employee executes a man-in-the-middle attack o...
Question 65: A home user reports that a speed test website shows the foll...
Question 66: Which of the following protocols utilizes 3DES encryption by...
Question 67: The networking concept of split horizon is designed to preve...
Question 68: Jeff, a business owner, has discovered that several of the n...
Question 69: A network administrator is following best practices to imple...
Question 70: Patches have just need released by a third-party vendor to r...
Question 71: A technician is setting up a public guest network for visito...
Question 72: Which of the following is an example of two factor authentic...
Question 73: Which of the following physical security controls is ONLY a ...
Question 74: A network technician is creating a network that uses Etherne...
Question 75: A network engineer is designing a wireless network that uses...
Question 76: During a high availability test of a system, a fiber interru...
Question 77: A datacenter recently installed an upgraded HVAC system to r...
Question 78: A network technician cannot connect to a remote RDP host. Th...
Question 79: A home user is pairing a bluetooth gaming controller with th...
Question 80: Which of the following standards can operate at both the 2.4...
Question 81: Joe, a technician, terminates ends on a new copper cable for...
Question 82: When installing a network cable with multiple strands, a tec...
Question 83: An administrator hosts all of the company's virtual servers ...
Question 84: A campus needs to provide wireless connectivity in a cafeter...
Question 85: Which of the following problems is MOST likely to arise when...
Question 86: Which of the following is the number of bits there are in 10...
Question 87: A user reports slow computer performance. A technician troub...
Question 88: Kim, a network technician, is installing an 802.11n network....
Question 89: Kim, a user, took a laptop on vacation and made changes to t...
Question 90: Which of the following provides the use of a secure tunnel f...
Question 91: A technician is called to investigate a connectivity issue t...
Question 92: The BEST way to secure the most vulnerable attack vector for...
Question 93: Which of the following is characterized by an attacker attem...
Question 94: A supervisor requests that a technician downloads a MIB for ...
Question 95: A network technician has been tasked to provide a local offi...
Question 96: Which of the following should be implemented in a networked ...
Question 97: When using high bandwidth applications over multiple WAN con...
Question 98: Which of the following cables is MOST likely to be terminate...
Question 99: A common technique used by malicious individuals to perform ...
Question 100: Kim, a technician, needs to locate a cable in an unorganized...
Question 101: A network administrator needs to allow employees to securely...
Question 102: Zach, a technician, is checking newly installed CAT5e cablin...
Question 103: A network technician configures a firewall to block only cer...
Question 104: A network technician is configuring a wireless network. To a...
Question 105: A network's design includes gateways connecting an assembly-...
Question 106: A technician receives a report that a user's workstation is ...
Question 107: Which of the following allows a technician to gather informa...
Question 108: A technician recently fixed a computer with several viruses ...
Question 109: A network technician must allow use of HTTP from the interne...
Question 110: Which of the following utilities would a technician use to d...
Question 111: A facility would like to verify each individual's identity p...
Question 112: Ann, an employee, has properly connected her personal wirele...
Question 113: A firewall technician has received calls stating the network...
Question 114: Which of the following separates broadcast domains?...
Question 115: A customer wishes to network several computers throughout a ...
Question 116: A network technician performs several switch commands to ena...
Question 117: Which of the following ports does DHCP use? (Select TWO)....
Question 118: Lisa, a network administrator, needs to allow all websites t...
Question 119: A network technician is tasked with designing a firewall to ...
Question 120: A network engineer is designing a campus-wide wireless netwo...
Question 121: Which of the following is used to provide hot standby capabi...
Question 122: A network administrator wants to implement a centralized mon...
Question 123: Which of the following provides the MOST protection against ...
Question 124: A CSU/DSU device will connect which of the following?...
Question 125: Zach, a network administrator, needs to purchase a new switc...
Question 126: No link lights on a switch's SFP are functioning, so the net...
Question 127: Which of the following IP addresses would be classified as p...
Question 128: Which of the following is the BEST way to prevent various ty...
Question 129: A company has just implemented VoIP. Prior to the implementa...
Question 130: Which of the following commands will display the associated ...
Question 131: Which of the following protocols is used to send mail to ano...
Question 132: A technician replaces a customer's router, and is now unable...
Question 133: A technician is in a large room that contains a large amount...
Question 134: Host1's application generates a payload of 2500B of data and...
Question 135: A VoIP line will MOST likely have which of the following con...
Question 136: A network technician wants to create a network where consult...
Question 137: A user has a network device that streams media to the LAN. T...
Question 138: A network administrator would like to collect information fr...
Question 139: Which of the following technologies could be implemented to ...
Question 140: Which of the following is a connectionless protocol? (Select...
Question 141: Which of the following cable types have a rated MAXIMUM band...
Question 142: A guest network segment typically exists to:...
Question 143: An organization wants to perform maintenance on any of its w...
Question 144: A network engineer is designing a new IDF in an old building...
Question 145: A network administrator has configured a new 100Mbs WAN circ...
Question 146: A network administrator is troubleshooting an issue with uns...
Question 147: Which of the following transmission methods is used for netw...
Question 148: A customer is attempting to download a file from a remote FT...
Question 149: In a network that requires multilayer switches to use authen...
Question 150: After upgrading a fiber link from 1Gbps, a network technicia...
Question 151: HOTSPOT You have been tasked with testing a CAT5e cable. A s...
Question 152: A network technician is responsible for the basic security o...
Question 153: A technician has completed a survey of a wireless network an...
Question 154: Which of the following protocols is used to securely connect...
Question 155: A company-wide audit revealed employees are using company la...
Question 156: Which of the following mediums is circuit switched?...
Question 157: A home user reports to a network technician that the Interne...
Question 158: An offsite backup company involved in an investigation is no...
Question 159: A small office home office (SOHO) customer is going to be re...
Question 160: Which of the following devices actively defends the network ...
Question 161: A building is equipped with light sensors that turn off the ...
Question 162: Which of the following technologies is required to allow all...
Question 163: Which of the following tools would a network technician use ...
Question 164: The marketing department leverages social media for company ...
Question 165: A technician has punched down only the middle two pins (pins...
1 commentQuestion 166: An organization is required to implement a wireless network....
Question 167: A company is having a new T1 line installed. Which of the fo...
Question 168: A network administrator is configuring a wireless network fo...
Question 169: A new user is reporting connectivity issues. Zach, the netwo...
Question 170: Which of the following specifications would Sara, an adminis...
Question 171: A network technician is selection the best way to protect a ...
Question 172: A company needs to implement stronger authentication, by add...
Question 173: A technician has replaced the Internet gateway router, and n...
Question 174: A network technician wants to baseline traffic flows on a sp...
Question 175: Which of the following would Sandy, a technician, find in a ...
Question 176: Which of the following wireless standards is capable of ONLY...
Question 177: A new fiber optic cable run has been installed, but users co...
Question 178: A username provides which of the following?...
Question 179: A technician notices that network access is becoming increas...
Question 180: Zach, a technician, needs to terminate a CAT5e Ethernet cabl...
Question 181: Which of the following security threats relies primarily on ...
Question 182: A technician has terminated a cable on the datacenter with a...
Question 183: Which of the following defines an IP address that is NOT rou...
Question 184: Which of the following occurs when antenna gain is increased...
Question 185: A network administrator updated an Internet server to evalua...
Question 186: Which of the following protocols is used to provide high-lev...
Question 187: A technician configures a firewall in the following manner i...
Question 188: An organization recently installed a firewall on the network...
Question 189: A project lead is reviewing the statement of work for an upc...
Question 190: Jeff, a technician, is charged with setting up network monit...
Question 191: Keeping an authoritative and timely record of network device...
Question 192: attempting to access a popular website. Which of the followi...
Question 193: Which of the following is used to assign an IP address to a ...
Question 194: A company has just installed wireless in their office. In on...
Question 195: A new OC3 experiencing intermittent connectivity and loss of...
Question 196: Ann, a network administrator, is in the process of cleaning ...
Question 197: Which of the following DNS records would allow for a website...
Question 198: Which of the following access controls enforces permissions ...
Question 199: Which of the following is an invalid MAC address?...
Question 200: A technician has responded to a security issue with an emplo...
Question 201: A network engineer arrives at work and discovers that many u...
Question 202: A system administrator wants to verify external IP addresses...
Question 203: An 801.11g wireless access point was configured as follows: ...
Question 204: company wants the public to be able to connect to the wirele...
Question 205: Ann, a network technician is preparing to configure a compan...
Question 206: A network administrator was told by the Chef Information Off...
Question 207: After an upgrade of network equipment and applications, user...
Question 208: A DSL modem connects to the provider's network using which o...
Question 209: A company wants to only allow incoming HTTP and HTTPS traffi...
Question 210: Lisa, a user, reports increased delays and timeouts when try...
Question 211: All users have lost Internet connectivity but can still reac...
Question 212: A network technician determines that two dynamically assigne...
Question 213: A network technician is working on a large project involving...
Question 214: Which of the following is true about an IP address if the fi...
Question 215: A national cable company providing TV, telephone, and Intern...
Question 216: A network administrator is tasked with building a wireless n...
Question 217: After an employee connected a switch port of a home router t...
Question 218: Which of the following is the MOST economical way for Sandy,...
Question 219: A systems administrator is requesting a single 10Gb copper l...
Question 220: Jeff, a customer, has a wireless network and has reported th...
Question 221: Which of the following is true about tunneling and encryptio...
Question 222: An administrator is replacing an existing WAP because the cu...
Question 223: A technician is troubleshooting a problem with a network pri...
Question 224: A technician installs three new switches to a company's infr...
Question 225: Kim, the client, has requested a cost-effective network solu...
Question 226: While monitoring the network, a technician notices that the ...
Question 227: Datacenter operations are under scrutiny. The largest cost i...
Question 228: Which of the following ports would Zach, a technician, need ...
Question 229: Which of the following is an IPv6 address?...
Question 230: A company is setting up a brand new datacenter and would lik...
Question 231: A network administrator need to install a border device on t...
Question 232: A user receives a new computer and now is unable to connect ...
Question 233: A security department notices that the ports on a FTP server...
Question 234: Which of the following describes what occurs with the ID of ...
Question 235: A network technician has just run a new point-to point fiber...
Question 236: A technician needs to limit the amount of broadcast traffic ...
Question 237: Lisa, a technician, is tasked to monitor various analog POTS...
Question 238: A user is unable to connect to a server in another building....
Question 239: There is a network looping problem after installing some swi...
Question 240: A technician, Joe, visits a site that has reported a network...
Question 241: Which of the following devices exist as either hardware or s...
Question 242: Which of the following needs to be configured on a switch to...
Question 243: A technician needs to use SNMP to manage several legacy devi...
Question 244: Which of the following is a secure way to connect to a devic...
Question 245: Which of the following protocols would Kurt, a technician, u...
Question 246: A technician needs to install a server to authenticate remot...
Question 247: Which of the following can ESD cause when working on network...
Question 248: Which of the following protocols would be used to send email...
Question 249: When configuring a WAP for a SOHO, which parameter will BEST...
Question 250: A network technician is troubleshooting intermittent issues ...
Question 251: A network administrator suspects an employee of using the co...
Question 252: A junior administrator replaced an old 10/100 switch with a ...
Question 253: As part of unified communications services, QoS must be impl...
Question 254: An administrator is troubleshooting a laptop that is unable ...
Question 255: Which of the following network devices restricts traffic bas...
Question 256: Two switches are connected using both a CAT6 cable and a CAT...
Question 257: Which of the following functions would be used to securely m...
Question 258: The presence of a Media Access Unit (MAU) is indicative of w...
Question 259: Which of the following will allow multiple frequencies to be...
Question 260: A small town is attempting to attract tourists who visit lar...
Question 261: A network technician has downloaded the latest vendor switch...
Question 262: Which of the following protocols are used for accessing a co...
Question 263: An analyst is investigating a cyber-incident involving a lap...
Question 264: A network topology in which all nodes have point to point co...
Question 265: Jeff, an administrator, has just finished installing a new s...
Question 266: Which of the following allows a central point to simultaneou...
Question 267: A network technician has been asked to make the connections ...
Question 268: Lisa, a network technician, needs to introduce a few more ca...
Question 269: After plugging a cable into a computer, a user reports there...
Question 270: Zach, a network technician, is configuring several switches ...
Question 271: Which of the following protocols is considered a hybrid rout...
Question 272: A company utilizes a patching server to regularly update the...
Question 273: When troubleshooting a T1 connection, the support representa...
Question 274: Which of the following Ethernet features will allow increase...
Question 275: Which of the following WAP security features offers the STRO...
Question 276: Which of the following physical devices provides the BEST se...
Question 277: Which of the following communication modes has the LOWEST ov...
Question 278: A network technician responds to a customer reporting that a...
Question 279: Lisa, a technician, is asked to not allow FTP traffic on a n...
Question 280: Which of the following ports is the default telnet port?...
Question 281: Which of the following subnet masks would allow for 192.168....
Question 282: Which of the following ports is used to provide secure sessi...
Question 283: A network administrator is configuring a VLAN across multipl...
Question 284: A unified communication system has a requirement to eliminat...
Question 285: Lisa, a technician, has configured a new switch that is remo...
Question 286: A network engineer is designing a network for a new branch o...
Question 287: A network technician needs to install an additional access p...
Question 288: An organization is upgrading the operating system on several...
Question 289: Which of the following solutions will detect and disable a r...
Question 290: Matt, an administrator, notices a flood fragmented packet an...
Question 291: A technician needs to test the length of a newly installed c...
Question 292: A technician is setting up a firewall on the network that wo...
Question 293: A user reports difficulties connecting a PC to a wired netwo...
Question 294: Coverage analysis for a new implementation of 802.11n WLAN i...
Question 295: An analog POTS voice line is no longer working and Kim, the ...
Question 296: Which of the following is used to proxy client requests for ...
Question 297: When configuring a wireless access point, Zach, a network ad...
Question 298: A technician discovers that a malware infection has damaged ...
Question 299: Jeff, a network engineer, is troubleshooting an issue where ...
Question 300: An organization has installed a new firewall. Users need to ...
Question 301: A network technician is informed that some clients cannot co...
Question 302: When querying a DNS server for an AAAA record, which of the ...
Question 303: A user is unable to print to a network printer. Which of fol...
Question 304: Joe, a home user, would like to share music throughout the c...
Question 305: A technician installs a new WAP and users in the area begin ...
Question 306: The software that allows a machine to run multiple operating...
Question 307: All scheduled work on production network equipment should be...
Question 308: Which of the following protocols is used to transmit outgoin...
Question 309: Which of the following cables will MOST likely be used to co...
Question 310: A network administrator wishes to configure a trunk between ...
Question 311: Which of the following BEST describes the process of documen...
Question 312: A company has a large number of employees that need VPN acce...
Question 313: A network technician replaced a faulty Ethernet cable. The t...
Question 314: A secondary datacenter in a remote location is used by a com...
Question 315: When setting up a new network monitoring utility, a technici...
Question 316: An administrator's router with multiple interfaces uses OSPF...
Question 317: Exploiting a weakness in a user's wireless headset to compro...
Question 318: Joe, and administrator, is setting up three more switches in...
Question 319: A technician troubleshooting an area that is having difficul...
Question 320: A network administrator received the following email from a ...
Question 321: A network technician has been tasked with connecting three 8...
Question 322: Which of the following network topologies allows only commun...
Question 323: Zach, a technician, wants to test a laptop's NIC for functio...
Question 324: A user is unable to log into the network successfully. Which...
Question 325: Kurt, a network technician, has configured a new firewall on...
Question 326: Which of the following is based ENTIRELY on using ICMP packe...
Question 327: Which of the following media types can carry a standard Ethe...
Question 328: A new firewall was recently installed blocking SMTP traffic....
Question 329: A network administrator is setting up a web server that will...
Question 330: A technician is looking at an issue with a computer connecti...
Question 331: A network technician has received a report that workstations...
Question 332: A technician is installing a network firewall and would like...
Question 333: A technician has installed an 802.11n network, and most user...
Question 334: Joe, the network manager, is leading a project to deploy a S...
Question 335: Zach, a technician, suspects a duplicate IP address assignme...
Question 336: A company has installed an access point and configured it to...
Question 337: A network technician is diagnosing a time-out issue generate...
Question 338: Which of the following will prevent switching loops by selec...
Question 339: Which of the following protocols uses port 3389?...
Question 340: Which of the following defines when Pete, an attacker, attem...
Question 341: An administrator is upgrading the switches in the server roo...
Question 342: A network administrator is troubleshooting an issue with a n...
Question 343: Use of group accounts should be minimized to ensure which of...
Question 344: Which of the following is the default subnet mask for a Clas...
Question 345: A company has separate subnets for each floor. A technician ...
Question 346: There is suspected virus activity on the network. Which of t...
Question 347: Which of the following MUST be used when securing a VoIP net...
Question 348: A network technician at a warehouse must implement a solutio...
Question 349: A user has no network connectivity. Jeff, the network techni...
Question 350: An administrator has received a recommendation against deplo...
Question 351: Which of the following infrastructure implementations is use...
Question 352: A single PRI can deliver multiple voice calls simultaneously...
Question 353: Ann, a technician, connects a pair of switches using redunda...
Question 354: A network administrator wishes to ensure there are no unnece...
Question 355: The Transport Layer of the TCP/IP model corresponds to which...
Question 356: How does a DHCP reservation work?...
Question 357: An administrator would like to test out an open source based...
Question 358: Which of the following devices is used to distribute network...
Question 359: A company has contracted with an outside vendor to perform a...
Question 360: Please refer to the attached exhibit. Which of the following...
Question 361: Jeff, a technician, has been asked to add a subnet to the co...
Question 362: Policies, procedures and end-user training are effective way...
Question 363: A technician has attempted to optimize the network but some ...
Question 364: Which of the following is the BEST way to mitigate security ...
Question 365: Which of the following is indicative of an FTP bounce?...
Question 366: Kim, a technician, is configuring an 802.11n access point. O...
Question 367: An Amplitude Modulation (AM) radio station may have a detrim...
Question 368: A customer has not been using security on a wireless network...
Question 369: A patch panel was recently installed in a new IDF. The techn...
Question 370: All accounting department users have lost connectivity. A te...
Question 371: A network technician receives a call from a user stating tha...
Question 372: A web-based application is responding very slowly. The netwo...
Question 373: An administrator needs to install a centrally located firewa...
Question 374: A network architect is designing a highly redundant network ...
Question 375: Which of the following is BEST used to perform a one-time te...
Question 376: A home office has a dozen devices that need a class based DH...
Question 377: Which of the following uses types and codes rather than port...
Question 378: A new network administrator is hired to replace a consultant...
Question 379: Which of the following ports are MOST commonly used to inter...
Question 380: A company suffers an outage due to a bad module in a core sw...
Question 381: The administrator would like to use the strongest encryption...
Question 382: Which of the following is a logical host on the network wher...
Question 383: Which of the following technologies allows more than two tra...
Question 384: A client is concerned with theft of equipment from the datac...
Question 385: Which of the following uses port 53 by default?...
Question 386: Given the following requirements: Notify administrators of A...
Question 387: A NAC service has discovered a virus on a client laptop. In ...
Question 388: A network technician was in the process of configuring a net...
Question 389: After noticing performance degradation on the network, a sys...
Question 390: Which of the following has a maximum transfer rate of 54Mbps...
Question 391: A network technician is installing a simple SOHO router with...
Question 392: A user is unable to open up websites on the Internet from a ...
Question 393: A network technician has set up a firewall and entered only ...
Question 394: Which of the following solutions is the MOST useful in helpi...
Question 395: Which of the following protocols is used to encapsulate othe...
Question 396: Which of the following default ports would need to be disabl...
Question 397: Which of the following uses eight groups of characters for a...
Question 398: A network administrator set up a network computer lab and di...
Question 399: A technician is installing new PCs on the network. After ins...
Question 400: Which of the following connector types would Sandy, a networ...
Question 401: A technician needs to set up uplink ports for multiple switc...
Question 402: Joe, a system administrator, is troubleshooting an issue wit...
Question 403: A technician is designing a small business network with a si...
Question 404: A company only wants preapproved laptops to be able to conne...
Question 405: A technician is being tasked to centralize the management of...
Question 406: A technician wants to configure the inbound port of a router...
Question 407: Which of the following routing protocols relies on hop count...
Question 408: Which of the following types of equipment should be used for...
Question 409: Which of the following devices should be installed on a netw...
Question 410: Which of the following should be used to prioritize specific...
Question 411: An engineer is reviewing network logs on a management switch...
Question 412: Which of the following should a technician upgrade to if the...
Question 413: OFDM, QAM and QPSK are all examples of which of the followin...
Question 414: Which of the following methods for network performance optim...
Question 415: Jeff, a user, is having a problem with a POTS line. Which of...
Question 416: A client's computer is receiving an IP address conflict erro...
Question 417: 169.254.0.100 is an IP address which would MOST likely come ...
Question 418: A user wants a SOHO network to be protected from unauthorize...
Question 419: A technician is configuring an ACL and needs to allow for tr...
Question 420: An organization wants to improve its ability to detect infil...
Question 421: Which of the following operates at OSI layer 2 to forward tr...
Question 422: Joe, a user, contacts the help desk because he is unable to ...
Question 423: Which of the following ports does SIP use?...
Question 424: A technician is installing a media converter that connects a...
Question 425: A network technician is troubleshooting connectivity problem...
Question 426: A firewall that operates at Layer 7 of the OSI model is know...
Question 427: A technician is testing a new web-based tool capable of gene...
Question 428: Something you have, something you are, and something you kno...
Question 429: An administrator needs to open the default port on the firew...
Question 430: Which of the following would need to be configured to allow ...
Question 431: A client has combined the voice-data circuit from a provider...
Question 432: A network technician has installed and configured a new wire...
Question 433: Which of the following is the network topology in which comp...
Question 434: A technician is troubleshooting a newly installed WAP that i...
Question 435: Which of the following diagnostic commands relies on proper ...
Question 436: A SOHO office recently installed a wireless network for empl...
Question 437: A new monitoring device is installed in the network that use...
Question 438: Which of the following devices can be used to offload outbou...
Question 439: A network engineer has been tasked with designing a network ...
Question 440: A workstation on the network is configured as follows. A use...
Question 441: Tenants access multiple wireless networks in a building. Use...
Question 442: Which of the following is a purpose of a VLAN?...
Question 443: After moving to an adjacent cubicle, a user is reporting tha...
Question 444: A network technician is installing a router in a 42U two-pos...
Question 445: Which of the following cables has the MOST twists per inch?...
Question 446: Which of the following anti-malware solutions should be impl...
Question 447: Various hypervisor guests are configured to use different VL...
Question 448: A Windows server has a problem after booting up. Kim, a tech...
Question 449: Which of the following uses certificates as a form of securi...
Question 450: Which of the following default services uses TCP/UDP port 88...
Question 451: Which of the following describes a process that can translat...
Question 452: Privilege creep among long-term employees can be mitigated b...
Question 453: During a business trip a user connects to the hotel's wirele...
Question 454: Which of the following BEST describes the differences betwee...
Question 455: A pest control contractor attempts to gain access to the dat...
Question 456: Which of the following network infrastructure implementation...
Question 457: An attack where the potential intruder tricks a user into pr...
Question 458: A network technician needs to address bandwidth issues on th...
Question 459: Which of the following will allow network traffic to travel ...
Question 460: A network manager wants a monthly report of the security pos...
Question 461: Which of the following residential Internet medias would emp...
Question 462: Which of the following is a proprietary routing protocol?...
Question 463: A technician wants to connect a new wireless router to a mai...
Question 464: Which of the following is a routed protocol that functions a...
Question 465: Which of the following is an example of a signaling protocol...
Question 466: A network uses a centralized server to manage credentials fo...
Question 467: Which of the following should a first responder perform when...
Question 468: A user is getting very weak signals while trying to connect ...
Question 469: While installing new network equipment, a network administra...
Question 470: A SOHO with ten Wi-Fi equipped laptops needs a new network i...
Question 471: A malicious student is blocking mobile devices from connecti...
Question 472: A network administrator is comparing several different wirel...
Question 473: Two office buildings are connected via copper network cablin...
Question 474: An outside technician notices that a SOHO employee who is lo...
Question 475: Which of the following ports would have to be allowed throug...
Question 476: A company is selecting a fire suppression system for their n...
Question 477: Which of the following are network topologies? (Select TWO)....
Question 478: HOTSPOT Workstations are unable to access the Internet after...
Question 479: Following the installation of a new SAN switch, users are ex...
Question 480: When a switch has multiple paths to reach the root bridge, i...
Question 481: When network administrators observe an increased amount of w...
Question 482: When Jeff, a technician, is troubleshooting a problem, which...
Question 483: A project manager is tasked with the planning of a new netwo...
Question 484: A network administrator notices that all of the company swit...
Question 485: A network technician is connecting three temporary office tr...
Question 486: An organization recently installed a firewall on the network...
Question 487: The software in a virtualized environment that controls reso...
Question 488: Zach, a network technician, is unable to remotely manage or ...
Question 489: Several users at an adjacent office building report connecti...
Question 490: A network administrator is configuring one distribution and ...
Question 491: When choosing a type of storage that integrates with the exi...
Question 492: A client requests that the network technician install additi...