Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

A.

netstat

B.

nslookup

C.

ping

D.

tracert

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Which of the following will allow secure, remote access to internal applications?

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

A.

QoS

B.

STP