What are two examples of personally identifiable information (PII)? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two examples of personally identifiable information (PII)? (Choose two.) credit card number first name street address language preference IP address Answers Explanation & Hints: Personally identifiable information (PII)…

Continue ReadingWhat are two examples of personally identifiable information (PII)? (Choose two.)

In a smart home, an owner has connected many home devices to the Internet, such as the refrigerator and the coffee maker. The owner is concerned that these devices will make the wireless network vulnerable to attacks. What action could be taken to address this issue?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

In a smart home, an owner has connected many home devices to the Internet, such as the refrigerator and the coffee maker. The owner is concerned that these devices will…

Continue ReadingIn a smart home, an owner has connected many home devices to the Internet, such as the refrigerator and the coffee maker. The owner is concerned that these devices will make the wireless network vulnerable to attacks. What action could be taken to address this issue?

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best…

Continue ReadingA small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model? Both stateful and packet-filtering firewalls can filter at the application layer. A stateful…

Continue ReadingWhich statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to…

Continue ReadingA network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic…

Continue ReadingThe employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?

Which command is used to manually query a DNS server to resolve a specific host name?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which command is used to manually query a DNS server to resolve a specific host name? nslookup ipconfig /displaydns tracert net Answers Explanation & Hints: The nslookup command was created to allow…

Continue ReadingWhich command is used to manually query a DNS server to resolve a specific host name?

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student…

Continue ReadingTwo students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​ router solicitation route redirection neighbor solicitation protocol unreachable router advertisement Answers Explanation & Hints: The ICMP…

Continue ReadingWhich two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish? checking the IP address on the network card testing the…

Continue ReadingA network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?

What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Network information: * local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10 * local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10 * remote server: 192.135.250.103 What task might a user be trying to…

Continue ReadingWhat task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?

Refer to the exhibit. A user issues the command netstat –r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. A user issues the command netstat –r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation? ::1/128 fe80::30d0:115:3f57:fe4c/128 fe80::/64 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128 Answers Explanation…

Continue ReadingRefer to the exhibit. A user issues the command netstat –r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?

Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.) Device 1:…

Continue ReadingThree devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.)

Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available? 255.255.255.192 255.255.255.252 255.255.224.0 255.255.255.248 255.255.192.0 Answers Explanation & Hints: With an IPv4 network, the subnet…

Continue ReadingGiven network 172.18.109.0, which subnet mask would be used if 6 host bits were available?