SkillSoft Test Questions & Answers | 100% Correct Answers | Verified | Latest 2024 Version
29 keer bekeken 0 keer verkocht
Vak
SkillSoft
Instelling
SkillSoft
When setting up a DHCP server, you are able to set parameters that the server will use when configuring
varions fields. These fields can include DNS server addresses, default gateway addresses, and DNS
domain names. They are called - Options
An administrator has configured a media server on the ...
SkillSoft Test Questions & Answers | 100% Correct Answers | Verified | Latest 2024 Version When setting up a DHCP server, you are able to set parameters that the server will use when configuring varions fields. These fields can include DNS server addresses, default gateway addresses, and DNS domain names. They are called - ✔✔Options An administrator has configured a media server on the company network. A video conference must be streamed to a select group of computers. Which of the following technologies would work best? - ✔✔Multicast (not broadcast) You need to share routes between two different routing protocols - what do you utilize? - ✔✔route redistribution You need to determine the uptime of a connection and the amount of data sent - ✔✔network connection Status dialog box Various servers are overheating in the server room. Which tool would best resolve this issue? - ✔✔Environmental monitor A junior administrator has some questions concerning VLANs. Which statements about VLAN traffic are true? - ✔✔802.1Q configured trunk ports forward untagged frames to the native VLAN 802.1Q configured trunk ports do not tag native VLAN frames You are configuring the firewall security of a network of 200 computers. You have configured a firewall for the perimeter of your network and now must choose a firewall solution for the computers on your network. Which firewall types would you choose? - ✔✔Software Host -based A client has complained of a slow system. Using the application control settings of their firewall to troubleshoot the issue, determine what is causing the problem. Which program is at fault? - ✔✔Free Offers.exe You decide to use the netstat command to look for listening ports. Which parameter is used? - ✔✔-a You already had to replace two cables because of bad connections caused by constant moving of the switches when working on them. What could you do to prevent this? - ✔✔Install patch panels Man -in-the-middle attacks - ✔✔Involve communications eavesdropping This attack requires compromised systems to help perform them - ✔✔Botnets In typical change management procedures, what step follows documenting a reason for change? - ✔✔A change request You need to connect a group of ethernet hosts to a wireless network located on the second floor. If the wireless access point on the second floor is within range, which device would best connect these hosts to the wireless network? - ✔✔Wireless bridge Which of the following systems are used in a SCADA system? - ✔✔RTU PLC You are designing the security solution for a network. Which types of firewalls should be placed at the perimeter of a home network? - ✔✔SOHO You are designing the security solution for a network. Which types of firewalls should be placed in a series of network hosts? - ✔✔Software You are designing the security solution for a network. Which types of firewalls should be placed at the perimeter of a corporate network? - ✔✔Hardware Network Users have reported that they are no longer able to access network resources that exist on the local LAN or WAN. You are still able to ping local computers using their IP addresses but cannot access them by UNC path. What should you check? - ✔✔DNS Server Which of the following fiber optic technologies use wavelength division multiplexing in its implementation? - ✔✔CWDM DWDM Which of the following is used to implement VLAN hopping? - ✔✔Double tagging An administrator has created a server image from a target computer. What can be done to Harden that image when it is deployed? ** - ✔✔Change the administrative password Update the software A company has been legally required to identify and gather electronically stored information. What is this process known as? - ✔✔E-Discovery Which of the following are characteristics of TACACS+ ? - ✔✔It is a Cisco proprietary authentication protocol It uses port 49 by default
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper AmazingGrace. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €12,14. Je zit daarna nergens aan vast.