Question 41
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS)
Question 42
Which of the following factors should be considered when evaluating a firewall to protect a datacenter's east-west traffic?
A. Replication traffic between an on-premises server and a remote backup facility
B. Traffic between VMs running on different hosts
C. Concurrent connections generated by Internet DDoS attacks
D. VPN traffic from remote offices to the datacenter's VMs
Question 43
SIMULATION -
You are tasked with verifying the following requirements are met in order to ensure network security.
Requirements:
Question 44
Which of the following is used to prioritize Internet usage per application and per user on the network?
A. Bandwidth management
B. Load balance routing
C. Border Gateway Protocol
D. Administrative distance
Question 45
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?
A. dig
B. arp
C. show interface
D. hostname
Question 46
Which of the following would MOST likely be used to review previous upgrades to a system?
A. Business continuity plan
B. Change management
C. System life cycle
D. Standard operating procedures
Question 47
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?
A. MIB
B. Trap
C. Syslog
D. Audit log
Question 48
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to downSeverity 5 LINK-UPDOWN: Interface 1/3, changed state to downWhich of the following describes the reason why the events are not being received?
A. The network device is not configured to log that level to the syslog server
B. The network device was down and could not send the event
C. The syslog server is not compatible with the network device
D. The syslog server did not have the correct MIB loaded to receive the message
Question 49
A network administrator is implementing OSPF on all of a company's network devices. Which of the following will MOST likely replace all the company's hubs?
A. A Layer 3 switch
B. A proxy server
C. A NGFW
D. A WLAN controller
Question 50
A network administrator discovers that users in an adjacent building are connecting to the company's guest wireless network to download inappropriate material.
Which of the following can the administrator do to MOST easily mitigate this issue?
A. Reduce the wireless power levels
B. Adjust the wireless channels
C. Enable wireless client isolation
D. Enable wireless port security