Question 36

Which of the following BEST describes the BGP routing protocol?
  • Question 37

    hich of the following can be used to prevent devices from handing out IP addresses?
  • Question 38

    A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?
  • Question 39

    While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?
  • Question 40

    A network technician needs to determine the reason for an outage in a building. During troubleshooting, the technician views the rules on a firewall and determines it has been configured to block specific traffic and is affecting some users. According to the network troubleshooting methodology, which of the following should be the technician's NEXT step?