Question 31

A network technician needs to correlate security events to analyze a suspected intrusion Which of the following should the technician use?
  • Question 32

    A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
  • Question 33

    A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:
    Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
    Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
    Which of the following describes the reason why the events are not being received?
  • Question 34

    A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients. Which of the following should a technician configure?
  • Question 35

    A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Select TWO.)