Which of the following is a valid IPv4 loopback address?
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?A . 10.0.0.1B . 127.0.0.1C . 172.16.1.1D . 192.168.1.1View AnswerAnswer: B Explanation: The loopback address is a special IP address that is designated...
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?A . Disable the network based firewallB . Implicit deny all traffic on networkC ....
Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?
A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. Which of the following must the technician configure on a...
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?A . APIPAB . MACC . StaticD . PublicView AnswerAnswer: A Explanation: APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is...
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?A . /24B . /32C . /28D . /29E . /30View AnswerAnswer: E Explanation: An IPv4...
Which of the following should the network technician do NEXT?
Topic 4, Troubleshooting A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A . Establish a theory of probable cause.B . Document actions and findings.C . Determine next steps...
Which of the following should the technician do NEXT in the troubleshooting methodology?
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...
Which of the following would the technician MOST likely configure?
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?A . Hardware firewallB . Proxy serverC . Software firewallD . GRE tunnelingView AnswerAnswer: C Explanation: A...
A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following?
A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of...
Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?
An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?A . The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.B . The administrator should...