Question
QUESTION 10 Your network is configured to be 192.168.0.026. What is the maximum number of hosts that can exist on the network? A. 254 B.
QUESTION 10
Your network is configured to be 192.168.0.0\26. What is the maximum number of hosts that can exist on the network?
A. | 254 | |
B. | 62 | |
C. | 64 | |
D. | 26 |
QUESTION 12
A network with 10 bits remaining for the host portion will have how many usable host addresses?
A. | 510 | |
B. | 1022 | |
C. | 2046 | |
D. | 4192 |
QUESTION 14
A subnet of 255.255.248.0 can be represented by what CIDR notation?
A. | /20 | |
B. | /29 | |
C. | /18 | |
D. | /21 |
QUESTION 15
Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?
A. | 172.16.2.0 | |
B. | 172.16.0.0 | |
C. | 172.16.1.0 | |
D. | 172.0.0.0 |
QUESTION 16
A network with a CIDR notation of /26 would have what subnet mask?
A. | 255.255.255.0 | |
B. | 255.255.255.192 | |
C. | 255.255.255.224 | |
D. | 255.255.255.240 |
QUESTION 17
You manage a simple network with one switch and one router. The router provides access to the internet. A user complains that https://zoom.com is accessible but Zoom meetings never connect. IP configuration of items are: computer: 192.168.1.105\24 GW 192.168.1.1 SwitchA: 192.168.1.10\24 Router: 192.168.1.1\24
Select the answer that most likely explains the problem and correctly recommends a method to confirm.
A. | The computer does not have a zoom client installed. Check installed apps and retest for the ability to connect to a meeting. | |
B. | The switch has the computer on the wrong VLAN. Change the port to VLAN0 and test again. | |
C. | The computer is being blocked by the router. Add an ACL to allow UDP 3478, 3479, 8801 outbound and retest for meeting participation. | |
D. | The computer is being blocked by the router. Add an ACL to allow TCP 443 inbound and retest for meeting participation. |
QUESTION 18
You manage a simple network with one switch and one router. The router provides access to the internet. A user complains the computer being used has no internet access. IP configuration of items in question are: computer: 192.168.1.105\24 GW 192.168.1.1 SwitchA: no IP address Router: 192.168.1.1
Select the answer that most likely explains the problem and correctly recommends a method to confirm.
A. | The switch does not have an IP address. Assign an IP address to the switch and test for internet access. | |
B. | The computer is being blocked by a firewall ACL. Check another computer for internet access. | |
C. | The computer has a bad physical connection. Check for a link light. | |
D. | The router may not have an active internet connection. Use ping or traceroute to test for access to google.com |
QUESTION 19
Your network is configured to be 172.16.31.0\24. What is the maximum number of hosts that can exist on the network?
A. | 65,534 | |
B. | 254 | |
C. | 0 | |
D. | 24 |
QUESTION 20
You manage a simple network with one switch and one router. The router provides access to the internet. A user complains about an inability to login to the RADIUS server. IP configuration of items are: computer: 192.168.1.105\16 GW 192.168.1.1 SwitchA: no IP address Router: 192.168.1.1\16 RADIUS Server: 192.168.2.10\16
Select the answer that most likely explains the problem and correctly recommends a method to confirm.
A. | The computer is being blocked by the router. Add an ACL to allow UDP/1812 and UDP/1813 in both directions and retest authentication. | |
B. | The switch does not have an IP address. Assign an IP address to the switch and test again. | |
C. | The computer and server are on different networks. Ping the the server from the computer to show that there are no responses. | |
D. | The computer has a bad physical connection. Check for a link light and check cabling. |
QUESTION 22
What statement regarding role-based access control is accurate?
A. | RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs. | |
B. | RBAC allows users to decide for themselves who has access to that user's resources. | |
C. | RBAC organizes resources into hierarchical classifications, such as "confidential" or "top secret". | |
D. | RBAC is the most restrictive method of access control. |
QUESTION 23
What does the Common Address Redundancy Protocol do?
A. | It allows a pool of computers or interfaces to share the same IP address. | |
B. | It allows multiple devices to share hardware resources. | |
C. | It allows multiple devices to share the same fully qualified domain name. | |
D. | It allows a pool of computers or interfaces to share the same MAC address. |
QUESTION 25
When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?
A. | Only one root port, which is the bridge's port that is furthest from the root bridge, can forward. | |
B. | All ports will forward frames to the root bridge, unless a BPDU is received back on that same port. | |
C. | Only one root port, which is the bridge's port that is closest to the root bridge, can forward. | |
D. | All ports can forward frames to the root bridge, provided they are not in a down state. |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started