A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?
A. traceroute
B. netstat
C. tcpdump
D. arp
Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?
A. Access, distribution, and core
B. Core, root, and distribution
C. Core, spine, and leaf
D. Access, core, and roof
Which of the following devices can operate in multiple layers of the OSI model?
A. Hub
B. Switch
C. Transceiver
D. Modem
Which of the following allows a remote user to connect to the network?
A. Command-line interface
B. API gateway
C. Client-to-site VPN
D. Jump box
A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email.
Which of the following should the engineer have done to prevent the issue from occurring?
A. Change the email client configuration to match the MX record.
B. Reduce the TTL record prior to the MX record change.
C. Perform a DNS zone transfer prior to the MX record change.
D. Update the NS record to reflect the IP address change.
Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?
A. Site-to-site VPN
B. SSH tunnel
C. API gateway
D. Dedicated line
A network engineer wants to establish a site-o-site VPN tunnel using a protocol that allows for both data confidentially and authentication. Which of the following is the best choice?
A. IKE
B. AH
C. ESP
D. IPSec
Which of the following copper wire standards utilizes four pairs of wires to achieve Gigabit Ethernet speeds?
A. 1000BASE-FX
B. 1000BASE-T
C. 1000BASE.LR
D. 1000BASE-SX
A company realizes that only half of its employees work in the office, and the employees who work from home no longer need a computer at the office. Which of the following security measures should the network administrator implement when removing a computer from a cubicle?
A. Disable DHCP on the computer being removed.
B. Place the switch port in a private VLAN.
C. Apply a firewall rule to block the computer's IP address.
D. Remove the employee's network access.
Which of the following most likely determines the size of a rack for installation? (Select two).
A. KVM size
B. Switch depth
C. Hard drive size
D. Cooling fan speed
E. Outlet amperage
F. Server height