Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following is used to redistribute traffic between one source and multiple servers that run the same service? A. Router B. Switch C. Firewall D. Load balancer Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link During a security audit, a consulting firm notices inconsistencies between the documentation and the environment. Which of the following can keep a record of who made the changes and what the changes are? A. Network access control B. Configuration monitoring C. Zero Trust D. Syslog Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following would the administrator most likely leverage? A. MAC filtering B. Administrative distance C. Bluetooth beacon signals D. IP address blocks Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A network administrator is reviewing a production web server and observes the following output from the netstat command. Which of the following actions should the network administrator take to harden the security of the web server? A. Disable the unused ports. B. Enforce access control lists. C. Perform content filtering. D. Set up a screened subnet. Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Users report performance issues on the network. A network administrator notices broadcast storms occurring. Which of the following protocols should the administrator configure to mitigate this issue? A. Spanning Tree B. Enhanced Interior Gateway Routing C. Cisco Discovery D. Link Layer Discovery E. Border Gateway Submit Answer