Which of the following is a valid IPv4 loopback address?

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?A . 10.0.0.1B . 127.0.0.1C . 172.16.1.1D . 192.168.1.1View AnswerAnswer: B Explanation: The loopback address is a special IP address that is designated...

November 16, 2018 No Comments READ MORE +

Which of the following should the technician perform?

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?A . Disable the network based firewallB . Implicit deny all traffic on networkC ....

November 15, 2018 No Comments READ MORE +

Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?

A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. Which of the following must the technician configure on a...

November 14, 2018 No Comments READ MORE +

A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?

A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?A . APIPAB . MACC . StaticD . PublicView AnswerAnswer: A Explanation: APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is...

November 12, 2018 No Comments READ MORE +

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?A . /24B . /32C . /28D . /29E . /30View AnswerAnswer: E Explanation: An IPv4...

November 12, 2018 No Comments READ MORE +

Which of the following should the network technician do NEXT?

Topic 4, Troubleshooting A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A . Establish a theory of probable cause.B . Document actions and findings.C . Determine next steps...

November 10, 2018 No Comments READ MORE +

Which of the following should the technician do NEXT in the troubleshooting methodology?

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...

November 7, 2018 No Comments READ MORE +

Which of the following would the technician MOST likely configure?

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?A . Hardware firewallB . Proxy serverC . Software firewallD . GRE tunnelingView AnswerAnswer: C Explanation: A...

November 6, 2018 No Comments READ MORE +

A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following?

A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of...

November 6, 2018 No Comments READ MORE +

Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?A . The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.B . The administrator should...

November 4, 2018 No Comments READ MORE +