An app on a user's computer is having problems downloading data. The app uses the following URL to download data:
https://www.companypro.net:7100/api
You need to use Wireshark to capture packets sent to and received from that URL.
Which Wireshark filter options would you use to filter the results? Complete the command by selecting the correct option from each drop-down list.
Note: You will receive partial credit for each correct selection.
Which device protects the network by permitting or denying traffic based on IP address, port number, or application?
A support technician examines the front panel of a Cisco switch and sees 4 Ethernet cables connected in the first four ports. Ports 1, 2, and 3 have a green
LED. Port 4 has a blinking green light.
What is the state of the Port 4?
A user reports that a company website is not available. The help desk technician issues a tracert command to determine if the server hosting the website is reachable over the network. The output of the command is shown as follows:
What can you tell from the command output?
Examine the following output:
Which two conclusions can you make from the output of the tracert command? (Choose 2.)
Note: You will receive partial credit for each correct answer.
A host is given the IP address 172.16.100.25 and the subnet mask 255.255.252.0.
What is the CIDR notation for this address?
Move each cloud computing service model from the list on the left to the correct example on the right
Note: You will receive partial credit for each correct answer.
Which command will display all the current operational settings configured on a Cisco router?
Move the MFA factors from the list on the left to their correct examples on the right. You may use each factor once, more than once, or not at all.
Note: You will receive partial credit for each correct selection.
You need to connect a computer's network adapter to a switch using a 1000BASE-T cable.
Which connector should you use?
A local company requires two networks in two new buildings. The addresses used in these networks must be in the private network range.
Which two address ranges should the company use? (Choose 2.)
Note: You will receive partial credit for each correct selection.
You want to store files that will be accessible by every user on your network.
Which endpoint device do you need?