Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 10 Your network is configured to be 192.168.0.026. What is the maximum number of hosts that can exist on the network? A. 254 B.

QUESTION 10

Your network is configured to be 192.168.0.0\26. What is the maximum number of hosts that can exist on the network?

A.

254

B.

62

C.

64

D.

26

QUESTION 12

A network with 10 bits remaining for the host portion will have how many usable host addresses?

A.

510

B.

1022

C.

2046

D.

4192

QUESTION 14

A subnet of 255.255.248.0 can be represented by what CIDR notation?

A.

/20

B.

/29

C.

/18

D.

/21

QUESTION 15

Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?

A.

172.16.2.0

B.

172.16.0.0

C.

172.16.1.0

D.

172.0.0.0

QUESTION 16

A network with a CIDR notation of /26 would have what subnet mask?

A.

255.255.255.0

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

QUESTION 17

You manage a simple network with one switch and one router. The router provides access to the internet. A user complains that https://zoom.com is accessible but Zoom meetings never connect. IP configuration of items are: computer: 192.168.1.105\24 GW 192.168.1.1 SwitchA: 192.168.1.10\24 Router: 192.168.1.1\24

Select the answer that most likely explains the problem and correctly recommends a method to confirm.

A.

The computer does not have a zoom client installed. Check installed apps and retest for the ability to connect to a meeting.

B.

The switch has the computer on the wrong VLAN. Change the port to VLAN0 and test again.

C.

The computer is being blocked by the router. Add an ACL to allow UDP 3478, 3479, 8801 outbound and retest for meeting participation.

D.

The computer is being blocked by the router. Add an ACL to allow TCP 443 inbound and retest for meeting participation.

QUESTION 18

You manage a simple network with one switch and one router. The router provides access to the internet. A user complains the computer being used has no internet access. IP configuration of items in question are: computer: 192.168.1.105\24 GW 192.168.1.1 SwitchA: no IP address Router: 192.168.1.1

Select the answer that most likely explains the problem and correctly recommends a method to confirm.

A.

The switch does not have an IP address. Assign an IP address to the switch and test for internet access.

B.

The computer is being blocked by a firewall ACL. Check another computer for internet access.

C.

The computer has a bad physical connection. Check for a link light.

D.

The router may not have an active internet connection. Use ping or traceroute to test for access to google.com

QUESTION 19

Your network is configured to be 172.16.31.0\24. What is the maximum number of hosts that can exist on the network?

A.

65,534

B.

254

C.

0

D.

24

QUESTION 20

You manage a simple network with one switch and one router. The router provides access to the internet. A user complains about an inability to login to the RADIUS server. IP configuration of items are: computer: 192.168.1.105\16 GW 192.168.1.1 SwitchA: no IP address Router: 192.168.1.1\16 RADIUS Server: 192.168.2.10\16

Select the answer that most likely explains the problem and correctly recommends a method to confirm.

A.

The computer is being blocked by the router. Add an ACL to allow UDP/1812 and UDP/1813 in both directions and retest authentication.

B.

The switch does not have an IP address. Assign an IP address to the switch and test again.

C.

The computer and server are on different networks. Ping the the server from the computer to show that there are no responses.

D.

The computer has a bad physical connection. Check for a link light and check cabling.

QUESTION 22

What statement regarding role-based access control is accurate?

A.

RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.

B.

RBAC allows users to decide for themselves who has access to that user's resources.

C.

RBAC organizes resources into hierarchical classifications, such as "confidential" or "top secret".

D.

RBAC is the most restrictive method of access control.

QUESTION 23

What does the Common Address Redundancy Protocol do?

A.

It allows a pool of computers or interfaces to share the same IP address.

B.

It allows multiple devices to share hardware resources.

C.

It allows multiple devices to share the same fully qualified domain name.

D.

It allows a pool of computers or interfaces to share the same MAC address.

QUESTION 25

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?

A.

Only one root port, which is the bridge's port that is furthest from the root bridge, can forward.

B.

All ports will forward frames to the root bridge, unless a BPDU is received back on that same port.

C.

Only one root port, which is the bridge's port that is closest to the root bridge, can forward.

D.

All ports can forward frames to the root bridge, provided they are not in a down state.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Secrets Of Analytical Leaders Insights From Information Insiders

Authors: Wayne Eckerson

1st Edition

1935504347, 9781935504344

More Books

Students also viewed these Databases questions

Question

Matlab- a code to check if a number is palindromic

Answered: 1 week ago