what is the IP address of the Marriott authentication server?
162.130.146.47
When a PGA and PMS data are out of sync, what are the step you should take?
Ensure that the process is running
Communication is flowing
DB Swap / Sync
FALSE!
What is the use case of port mirroring?
Port mirroring is a technique used in networking to duplicate network traffic from one port to another for analysis. It is widely used for various purposes, including network troubleshooting, security monitoring, compliance audits, and performance analysis
Gateway
What is the email address prefix that can be used to reach all IT staff at a managed property? provide an example->
Marsha-IRFD@marriott.com
what is the command to restart the freeradius service?
systemctl restart freeradius
This feature validates ARP replies against the DHCP snooping table to shut down ARP poisoning on access ports.
Dynamic ARP Inspection
On MR, this profile lets you standardize radio settings (bands, min bitrate, power, DFS behavior) across APs by environment type.
What is an RF Profile?
In ASA Firewalls what is the DHCP limitation that is built on the firewall?
the subnet cannot be bigger than a /24 network
what is the Marriott defined vlan for LSP head end equipment? And subnet for additional 10 points!
VLAN 130
192.168.223.128/25
What is the general process to follow if you encounter a VM with CentOS?
Replace it!
Two switches disagree on the root bridge in a mixed vendor network. What single field ultimately breaks the tie when priorities are equal?
The lowest MAC address in the Bridge ID.
What is the limit of SSID that can be broadcasted on a Meraki Access point?
15 unique SSIDs, but it is best practice to enable no more than 3 SSIDs per individual Access Point
In Watchguard firewalls how to I validate that an ACL is behaving as expected?
Use the policy checker on the Firewall Policies Section of the GUI
What is the MARSHA_GAPPS SSID used for?
Assa Abloy/Employee safety devices
What is the command you use if you wanna see the general logs on a radius server?
tail -f /var/log/radius/radius.log
You add four new 802.3at APs to a PoE switch already near budget. Everything works until peak hours, then two APs Crash out. Which layer and constraint bit you?
Layer 1; PoE power budget limit.
In meraki what is the PMS system that we use to authenticate users via Last name and room number?
11Os
If a Watchguard firewall needs to block Torrent Traffic? what is the feature it needs enabled?
P2P Inspection and requires a license
What service does Marriott subscribe to for DNS?
What are the IP addresses?
Cisco Umbrella
208.67.222.222
208.67.220.220
When working with a serial PMS interface, how does every single transaction start?
ENQ
To Prevent loops what is the mechanism used?
Spanning Tree
In a meraki networks, how should you configure ports facing other network equipment to ensure communication flow?
Ports connecting network devices such as switches or wireless access points should be configured as trusted DAI (Dynamic APR inspection) to avoid connectivity issues. DAI relies on DHCP snooping table information to perform validation
The basic syntax of Any ACL will Require 5 Basic elements. Number those Elements.
Source IP /Subnet / Host
Destination IP /Subnet / Host
Source Port
Destination Port
Traffic Type