Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!
A technician, John, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should John use for this subnet?
A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo” command to list information about the existing condition.myClient$ wificard –getinfo agrCtlRSSI: -72 agrExtRSSI: 0state: runningop mode: station lastTxRate: 178MaxRate: 300802.11 auth: open link auth: wpa2-pskBSSID: 0F:33:AE:F1:02:0A SSID: CafeWireless Channel: 149,1Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
A. The WAP is using RC4 encryption
B. The WAP is using 802.11a
C. The WAP is using AES encryption
D. The WAP is using the 2.4GHz channel
E. The WAP is using the 5GHz channel
F. The WAP is using 802.11g
A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. TheISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:Interface A:IP address: 10.10.150.16Subnet mask: 255.255.255.240Default gateway: 10.10.150.32Speed: 1000 MbpsDuplex: AutoState: No ShutdownNone of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO).
A. There is a duplex mismatch between the router and ISP.
B. The router interface is turned off.
C. The interface is set to the incorrect speed.
D. The router is configured with the incorrect subnet mask.
E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.
A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTPserver. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).
A technician, John, needs to troubleshoot a recently installed NIC. He decides to ping the localloopback address. Which of the following is a valid 1Pv4 loopback address?
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company’s objectives?
A. 11, 10, 12, 13
B. 12, 10, 11, 13
C. 13, 10, 12, 11
D. 13, 12, 11, 10
The administrator’s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue?
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not setKeep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
A. Set the loopback address
B. Change the IP address
C. Change the slash notation
D. Change duplex to full
A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody
A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website?