A host is given the IP address 172.16.100.25 and the subnet mask 255.255.252.0.
What is the CIDR notation for this address?
Move the security options from the list on the left to its characteristic on the right. You may use each security option once, more than once, or not at all.
Note: You will receive partial credit for each correct answer.
During the data encapsulation process, which OSI layer adds a header that contains MAC addressing information and a trailer used for error checking?
Which command will display the following output?
A Cisco PoE switch is shown in the following image. Which type of port will provide both data connectivity and power to an IP phone?
Move the MFA factors from the list on the left to their correct examples on the right. You may use each factor once, more than once, or not at all.
Note: You will receive partial credit for each correct selection.
A user initiates a trouble ticket stating that an external web page is not loading. You determine that other resources both internal and external are still reachable.
Which command can you use to help locate where the issue is in the network path to the external web page?
What is the purpose of assigning an IP address to the management VLAN interface on a Layer 2 switch?
A Cisco switch is not accessible from the network. You need to view its running configuration.
Which out-of-band method can you use to access it?
You plan to use a network firewall to protect computers at a small office.
For each statement about firewalls, select True or False.
Note: You will receive partial credit for each correct selection.
Which protocol allows you to securely upload files to another computer on the internet?
An engineer configured a new VLAN named VLAN2 for the Data Center team. When the team tries to ping addresses outside VLAN2 from a computer in
VLAN2, they are unable to reach them.
What should the engineer configure?