Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is a difference between EOL and EOS?

A.

EOL discontinues the product but may offer support.

B.

EOS replaces free support with a subscription model.

C.

EOS only applies to physical products.

D.

EOL still guarantees warranty service.

A security administrator is creating a new firewall object for a device with IP address 192.168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields. Which of the following is the correct subnet mask to use?

A.

255.255.254.0

B.

255.255.255.1

C.

255.255.255.128

D.

255.255.255.192

A company security policy requires all network traffic from remote employees ' corporate laptops to use the company’s VPN. Which of the following network access methods best describes this scenario?

A.

Clientless VPN

B.

Full-tunnel

C.

Site-to-site tunnel

D.

Split-tunnel

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

A network administrator is managing network traffic so that classified services and applications are prioritized. Which of the following technologies should the network administrator use?

A.

Load balancing

B.

Time to live

C.

Quality of service

D.

Content delivery network

A network engineer is designing an internal network that needs to support both IPv4 and IPv6 routing. Which of the following routing protocols is capable of supporting both IPv4 and IPv6?

A.

OSPFv3

B.

RIPv2

C.

BGP

D.

EIGRP

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Which of the following does a hash provide?

A.

Non-repudiation

B.

Integrity

C.

Confidentiality

D.

Availability

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Which of the following ports is used for secure email?

A.

25

B.

110

C.

143

D.

587

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

While troubleshooting a VoIP handset connection, a technician ' s laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?

A.

NAT

B.

VIP

C.

PAT

D.

BGP