A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:

A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices: Subnetwork A: IP…

Comments Off on A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:

Match the characteristic to the forwarding method. (Not all options are used.)

Match the characteristic to the forwarding method. (Not all options are used.) Explanation & Hint: Cut-Through Switching: Begins forwarding when the destination address is received: This mode starts to forward…

Comments Off on Match the characteristic to the forwarding method. (Not all options are used.)

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many…

Comments Off on Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only…

Comments Off on An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Match the application protocols to the correct transport protocols.

Match the application protocols to the correct transport protocols. Explanation & Hint: DHCP (Dynamic Host Configuration Protocol) - Typically uses UDP. DHCP is used for dynamic IP addressing and operates…

Comments Off on Match the application protocols to the correct transport protocols.

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) ---> Case A handles communication between upper layer networking…

Comments Off on Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Match the command line utility with the function.

Match the command line utility with the function. Use the ping command utility for IPv4 only.  ---> ping -4 Use the ping command utility for IPv6 only.  ---> ping -6…

Comments Off on Match the command line utility with the function.

What are two functions of a router? (Choose two.)

What are two functions of a router? (Choose two.) A router connects multiple IP networks. It determines the best path to send packets. It controls the flow of data via…

Comments Off on What are two functions of a router? (Choose two.)

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of…

Comments Off on A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?

What principle prevents the disclosure of information to unauthorized people, resources,  and processes?

What principle prevents the disclosure of information to unauthorized people, resources,  and processes? integrity confidentiality availability accounting nonrepudiation Explanation & Hint: The security principle of confidentiality refers to the prevention…

Comments Off on What principle prevents the disclosure of information to unauthorized people, resources,  and processes?

Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?

Floor(config)# interface gi0/1 Floor(config-if)# description Connects to the Registrar LAN Floor(config-if)# ip address 192.168.225.223 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface gi0/0 Floor(config-if)# description Connects to the Manager LAN Floor(config-if)# ip…

Comments Off on Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?

Refer to the exhibit. A network administrator is connecting a new host to the Medical LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?

BldgA(config)# interface gi0/1 BldgA(config-if)# description Connects to the Medical LAN BldgA(config-if)# ip address 192.168.191.189 255.255.255.0 BldgA(config-if)# no shutdown BldgA(config-if)# interface gi0/0 BldgA(config-if)# description Connects to the Client LAN BldgA(config-if)# ip…

Comments Off on Refer to the exhibit. A network administrator is connecting a new host to the Medical LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?