SIMULATION Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2. INSTRUCTIONS Click on each router to review output, identity any Issues, and configure the appropriate solution
If at any time you would like to bring back the initial state of trie simulation, please click the reset All button; A. See the solution configuration below in Explanation.
B. PlaceHolder
C. PlaceHolder
D. PlaceHolder
A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?
A. Sides
B. Top
C. Front
D. Rear
Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?
A. DNS poisoning
B. Denial-of-service
C. Social engineering
D. ARP spoofing
A network administrator is reviewing north-south traffic to determine whether a security threat exists. Which of the following explains the type of traffic the administrator is reviewing?
A. Data flowing between application servers
B. Data flowing between the perimeter network and application servers
C. Data flowing in and out of the data center
D. Data flowing between local on-site support and backup servers
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
A. SNMP trap
B. Port mirroring
C. Syslog collection
D. API integration
A network technician plugged a workstation in to a network device. When the technician turned on the workstation, it was not connected at full duplex. Which of the following devices was the workstation connected to?
A. Media converter
B. Hub
C. Bridge
D. Layer 3 switch
A packet has a destination address that is located outside of the local network. Which of the following should be used to route this packet out of the local network?
A. DNS server
B. Load balancer
C. DHCP server
D. Default gateway
Users are connected to a switch on an Ethernet interface of a campus router. The service provider is connected to the serial 1 interface on the router. The output of the interfaces is: E1/0: 192.168.8.1/24 S1: 192.168.7.252/30
After router and device configurations are applied, internet access is not possible. Which of the following is the most likely cause?
A. The Ethernet interface was configured with an incorrect IP address.
B. The router was configured with an incorrect loopback address.
C. The router was configured with an incorrect default gateway.
D. The serial interface was configured with the incorrect subnet mask.
Which of the following attacks utilizes a network packet that contains multiple network tags?
A. MAC flooding
B. VLAN hopping
C. DNS spoofing
D. ARP poisoning
Which of the following, in addition to a password, can be asked of a user for MFA?
A. PIN
B. Favorite color
C. Hard token
D. Mother's maiden name