A workstation is configured with the following network details:
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A. 10. 1. 2. 0
B. 10. 1. 2. 1
C. 10. 1. 2. 23
D. 10. 1. 2. 255
E. 10. 1. 2. 31
A technician is installing new equipment in a datacenter and needs to identify the appropriate power and network connections. Which of the following should the technician use?
A. Network configuration
B. Logical topology
C. Rack diagrams
D. Work instructions
Which of the following would be the BEST way to track all the networks that are in use at an organization?
A. DHCP
B. IPAM
C. Scope options
D. Lookup zone
A customer is unable to determine a company's IPv6 address when performing a command that translates FQDN to an IP. Which of the following DNS records needs to be updated?
A. A
B. MX
C. CNAME
D. AAAA
A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel's patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?
A. Place a switch at the hotel's patch panel for connecting each room's cables
B. Place a switch on each table to ensure strong connectivity
C. Place repeaters between the patch panel and the rooms
D. place a switch at the wall jack and run the cables in the room from there
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist?
A. 3
B. 12
C. 13
D. 14
E. 15
Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses. Which of the following IP address schemas is being utilized?
A. Private IP
B. Static IP
C. APIPA
D. Loopback
A network administrator has created a new VLAN for the server and clients within the accounting department and wants to outline how it integrates with the existing network. Which of the following should the administrator create?
A. Logical diagram
B. Physical diagram
C. Rack diagram
D. Configuration diagram
Which of the following BEST describes the RADIUS authentication service protocol?
A. A protocol that sends passwords to the authentication server
B. A protocol that sends encrypted tickets from the authentication server
C. A protocol that sends X.500 service requests to the authentication server
D. A protocol that sends configuration information from the authentication server
A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?
A. 802.1X
B. Captive portal
C. Port security
D. NAC