Question 6
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
Question 7
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
Question 8
Which of the following routing protocols is used to exchange route information between public autonomous systems?
Question 9
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?
Question 10
A network requirement calls for segmenting departments into different networks. The campus network is set up with users of each department in multiple buildings. Which of the following should be configured to keep the design simple and efficient?