Which configuration change will allow the PING to be successful?
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?A . Replace the router with a Layer 2 switch that supports VLANsB . Change VLAN 20...
As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)
As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)A . OSPFB . IS-ISC . RIPv1D . BGPE ....
The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the BEST way for the company to connect these networks?
In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company b uses the following scheme: Subnet 1: 192.168.1.50/28 The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the...
Which of the following protocols uses port 3389?
Which of the following protocols uses port 3389?A . IMAPB . DHCPC . SSHD . RDPView AnswerAnswer: D
Which of the following functions would be used to securely monitor and actively manage external connections?
Which of the following functions would be used to securely monitor and actively manage external connections?A . VPN concentratorB . HIDSC . Load balancerD . Packet shaperView AnswerAnswer: A
Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
Which of the following would Kim, a technician, do to monitor remote traffic through an access point?A . Enable an SNMP agentB . Enable network mappingC . Set monitoring SSIDD . Select WPA2View AnswerAnswer: A
Which of the following resources can be used to verify this problem?
Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?A . Network mapB . Environmental monitorC . Placement mapD . SyslogView AnswerAnswer: D
Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)
Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)A . 802.11aB . 802.11acC . 802.11bD . 802.11gE . 802.11nView AnswerAnswer: B,E
A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located?
A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely...
Which of the following is the MOST likely reason?
Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?A . Incorrect DNSB . Incorrect subnet...