Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?
Question 102
A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?
Question 103
Which of the following uses the destination IP address to forward packets?
Question 104
Which of the following OSI model layers is where conversations between applications are established, coordinated, and terminated?
Question 105
A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office?
Question 106
A network administrator decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address management. The devices were properly connected into the LAN but autoconfiguration of the IP address did not occur as expected. Which of the following should the network administrator verify?
Question 107
Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model?
Question 108
A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
Question 109
Which of the following would be used to expedite MX record updates to authoritative NSs?
Question 110
A client moving into a new office wants the IP network set up to accommodate 412 network-connected devices that are all on the same subnet. The subnet needs to be as small as possible. Which of the following subnet masks should be used to achieve the required result?