-
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()
A . TestKing# show eigrp entries
B . TestKing# show protocols
C . TestKing# debug eigrp routes
D . TestKing# show ip route eigrp
E . TestKing# show route eigr
-
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
A . The default gateway is configured on a different subnet form this host.
B . The host is a member of the fifth usable subnet of the 192.168.16.0 network.
C . The subnetwork address for this host is 192.168.16.160/28.
D . The address of the next higher subnet is 192.168.16.192.
E . The address of the router interface that is attached to this subnetwork is 192.168.16.190.
F . There are 60 usable host addresses on this subnet.
-
A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish this task?()
A . access-list 101 deny tcp 192.168.1.128 0.0.015 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
B . access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23 access-list 1 permit ip any any
C . access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21 access-list 1 permit ip any any
D . access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
E . access-list 101 deny ip 192.168.1.128 0.0.0.240 192.158.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
F . access-list 101 deny ip 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which threevalid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()
A . A switch.
B . A router.
C . A network adapter card.
D . A hub.
E . A repeater.
-
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()
A . Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
B . Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
C . Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
D . Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
-
Refer to the exhibit. The company uses EIGRP as the routing protocol. What path will packets take from a host on 192.168.10.192/26 network to a host on the LAN attached to router R1?()https://assets.asklib.com/images/image2/2018072410123247953.jpg
A . The path of the packets will be R3 to R2 to R1.
B . The path of the packets will be R3 to R1 to R2.
C . The path of the packets will be both R3 to R2 to R1 and R3 to R1.
D . The path of the packets will be R3 to R1
-
A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A . access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B . access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C . access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D . access-list 10 permit ip 192.168.146.0 0.0.0.1.255
E . access-list 10 permit ip 192.168.148.0 0.0.0.1.255
F . access-list 10 permit ip 192.168.146.0 255.255.255.0
-
On the network 131.1.123.0/27, what is the last IP address that can be assigned to a host?()
A . 131.1.123.30
B . 131.1.123.31
C . 131.1.123.32
D . 131.1.123.33
-
Refer to the exhibit. GLBP has been configured on the network. When the interface serial0/0/1 on router R1 goes down,
how is the traffic coming from Host1 handled? ()
https://assets.asklib.com/images/image2/2018073015230243383.jpg
A . The traffic coming from Host2 is forwarded through router R2 with no disruption. The traffic from Host1 is dropped due to the disruption of the load balancing feature configured for the glbp group.
B . The traffic coming from both hosts is temporarily interrupted while the switchover to make R2 active occurs.
C . The traffic coming from Host2 is forwarded through router R2 with no disruption. Host1 sendsan ARP request to resolve the MAC address for the new virtual gateway.
D . The traffic coming from Host1 and Host2 is forwarded through router R2 with no disruption.
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
A . IP
B . ICMP
C . TCP
D . UDP
-
A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()
A . No additional steps are required.
B . Add the appropriate source-interface command.
C . The router cannot access a server in the Enterprise Campus network.
D . The Teleworker Router does not have any client applications; therefore this type of request is not possible.
-
The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?()
A . 172.25.78.243
B . 172.25.98.16
C . 172.25.72.0
D . 172.25.94.255
E . 172.25.96.17
F . 172.25.100.16
-
How could a large corporation with many specialized divisions benefit from using VLANs on their networks?()
A . VLANs allow access to network services based on department, not physical location.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a low-latency, high bandwidth internetworking alternative.
D . VLANs provide a method of communication between IP addresses in large networks.
E . VLANs establish segmented broadcast domains in switched networks.
F . VLANs can greatly simplify adding, moving, or changing hosts on the network.
-
You have a Windows Server 2008 R2 Hyper-V server with two network adapters named Adapter1 and Adapter2. You need to configure the server to host virtual machines (VMs) on different networks. Which two actions should you perform on the host server?()
A . Set Adapter1 as a management interface.
B . Configure Adapter1 to support jumbo frames.
C . Set Adapter2 in Trunk mode, and configure VM VLAN tags.
D . Disable TCP Chimney support on Adapter2, and configure VM VLAN tags.
-
You have a Windows Server 2008 R2 Hyper-V server with two network adapters named Adapter1 and Adapter2. You need to configure the server to host virtual machines (VMs) on different networks. Which two actions should you perform on the host server?()
A . Set Adapter1 as a management interface.
B . Configure Adapter1 to support jumbo frames.
C . Set Adapter2 in Trunk mode, and configure VM VLAN tags.
D . Disable TCP Chimney support on Adapter2, and configure VM VLAN tags.
-
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?()https://assets.asklib.com/images/image2/201807241052383841.jpg
A . 255.255.255.0
B . 255.255.254.0
C . 255.255.252.0
D . 255.255.248.0
-
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A . access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B . access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C . access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D . access-list 10 permit ip 192.168.146.0 0.0.1.255
E . access-list 10 permit ip 192.168.148.0 0.0.1.255
F . access-list 10 permit ip 192.168.146.0 255.255.255.0
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 hosts a custom application named App1. App1 is accessible on TCP port 5000.You need to encrypt App1 data on the network.What should you do?()
A . From the Local Security Policy console, configure the Security Options.
B . From the Local Security Policy console, configure the Application Control Policies.
C . From the Windows Firewall with Advanced Security console, create an inbound rule.
D . From the Windows Firewall with Advanced Security console, create a connection security rule.
-
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
A . IP
B . ICMP
C . TCP
D . UDP
-
Network Access Protection (NAP) is configured for the corporate network.Users connect to t
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.