You need to keep users in all other departments from accessing the servers used by the finance department.
Which of the following technologies should you use to logically isolate the network?
NIC teaming
MAC filtering
VLANs
Subnetting
VLANs
A network administrator is configuring a new network segment that will use EIGRP as its routing protocol. The network consists of several routers connected in a mesh topology. The administrator wants to ensure efficient use of bandwidth and quick convergence in case of a link failure.
One of the routers, Router A, is connected to a critical server that hosts time-sensitive applications.
What should the administrator prioritize when configuring EIGRP on Router A to ensure the best performance for time-sensitive applications?
Increase the bandwidth metric on all links.
Increase the hop count metric.
Decrease the delay metric on the link to the critical server.
Enable periodic updates of the entire routing information base.
Decrease the delay metric on the link to the critical server.
What does the term "transparent" firewall refer to?
A firewall that allows all traffic without inspection
A firewall implemented as a layer 2/virtual wire
A firewall that is invisible to users
A firewall that does not require any configuration
A firewall implemented as a layer 2/virtual wire
Which of the following is NOT a metric used by BGP for path selection?
Local preference
Hop count
Weight
Encryption strength
Encryption strength
Which feature is most likely to be supported by routers designed for medium to large networks?
Limited to four Ethernet ports
No support for virtual private networks (VPNs)
Plug-in cards for WAN interfaces
Basic firewall capabilities only
Plug-in cards for WAN interfaces
How are communications between VLANs facilitated?
answer
By configuring VLANs with the same ID
Through a network firewall
Through direct connection
Through an IP router or layer 3 capable switch
Through an IP router or layer 3 capable switch
What is the BEST practice for remotely managing a router?
Creating a virtual interface known as a loopback interface
Connecting through any physical interface without precautions
Using an unsecured protocol for remote access
Using a direct cable connection
Creating a virtual interface known as a loopback interface
Which of the following is a characteristic of a packet filtering firewall?
It can inspect only port numbers and not any other Layer 4 header information.
It can inspect only port numbers and not any other Layer 4 header information.
It operates at Layer 7 of the OSI model.
It is stateful.
It filters traffic based on the content of the data packet.
It can inspect only port numbers and not any other Layer 4 header information.
In a RIP network, Router X is connected to networks 10.0.1.0/24 and 10.0.2.0/24. Router Y is connected to networks 10.0.2.0/24 and 10.0.3.0/24. Router Z is connected to networks 10.0.3.0/24 and 10.0.4.0/24.
If Router X needs to send data to the 10.0.4.0/24 network, which of the following paths will it choose based on RIP's routing protocol mechanics?
Directly to Router Z because it is the final destination
It will not be able to find a route because RIP does not support more than two hops
To Router Y, then back to Router X because of a routing loop
To Router Y, then Router Z because it has the lowest hop count
To Router Y, then Router Z because it has the lowest hop count
What is the primary function of Link State Advertisements (LSAs) in OSPF?
To request specific routing information from neighbors
To distribute routing and topology information
To authenticate OSPF messages
To announce the presence of a new router
To distribute routing and topology information
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network.
Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer.
Which of the following should you use in this situation?
Spanning Tree
VLAN
VPN
Port security
VLAN
What does a router do when it receives a packet with a destination address?
Reads destination the address and forwards the packet
Discards the packet immediately
Sends the packet back to the source
Forwards the packet based on the source address
Reads destination the address and forwards the packet
What is the purpose of controlling outbound traffic with a firewall?
answer
To monitor employee internet usage
To block unauthorized applications and malware
To increase internet speed
To encrypt all outgoing data
To block unauthorized applications and malware
What must be configured if DHCP services are located in a different VLAN from the client devices?
A unique DNS server for each VLAN
A DHCP relay
A direct physical connection between VLANs
A static route on the DHCP serve
A DHCP relay
Considering the example below of three routers connected in a series, which networks is Router A directly connected to? (Select two.)
10.0.4.0/24
10.0.3.0/24
10.0.1.0/24
0.0.0.0/0
10.0.2.0/24
10.0.3.0/24
10.0.2.0/24
What is the role of 802.1Q tagging in VoIP configurations?
To decrease the bandwidth used by voice traffic
To assign voice traffic to a specific VLAN
To encrypt voice traffic
To increase the speed of voice traffic
To assign voice traffic to a specific VLAN
Which of the following is a method that allows you to connect a private network to the Internet without obtaining registered addresses for every host?
OSPF
EIGRP
NAT
BGP
NAT
If you can ping a host's default gateway but cannot ping hosts on remote networks, what should you suspect?
A cable disconnection
A firewall issue
A DNS issue
A routing issue
A routing issue
Which layer of the three-tiered network hierarchy typically uses layer 3 capable switches?
All of the above
Core Layer
Distribution Layer
Access Layer
Distribution Layer
A network engineer is troubleshooting connectivity issues in a network and uses the traceroute command to diagnose the problem. The traceroute output shows that packets are being sent through an unexpected path that includes the same routers multiple times.
What does this indicate, and what should the engineer check first?
This indicates a split horizon issue; the engineer should check if split horizon is disabled.
This indicates a well-optimized network; the engineer should check for any unused routes.
This indicates a potential routing loop; the engineer should check the routing configurations on the involved routers.
This indicates excessive route summarization; the engineer should check the summarization boundaries.
This indicates a potential routing loop; the engineer should check the routing configurations on the involved routers
A small tech startup, TechInnovate, has recently moved to a new office and is in the process of setting up their internet connection. They have been allocated a single public IP address by their Internet Service Provider (ISP).
The company has 25 employees, each with at least one device that needs to connect to the Internet. The IT manager decides to implement Port Address Translation (PAT) on their network router.
Given this scenario, which of the following outcomes is MOST likely to occur as a result of implementing PAT?
Each device will be assigned a public IP address by the router.
Internet access will be limited to only one device at a time due to the single public IP address.
Each device will be assigned a unique public IP address by the router.
All devices will be able to access the Internet simultaneously using the single public IP address.
All devices will be able to access the Internet simultaneously using the single public IP address.
Which of the following is another term for Port Address Translation (PAT)?
ARP spoofing
NAT overloading
Static NAT
Dynamic NAT
NAT overloading
What factor is considered when there are identical paths with equal administrative distances to a destination?
The path with the lowest metric value
The path with the shortest prefix length
The path with the highest metric value
The path with the most recent update
The path with the lowest metric value
What is the role of the Gateway/next hop parameter in a routing table?
It determines the speed at which the packet is forwarded.
It specifies the final destination of the packet.
It identifies the router's physical location.
It indicates the next router or gateway along the path to the destination
It indicates the next router or gateway along the path to the destination.
What indicates that a host with a specific IP is expected but not available on the network, according to the ARP cache?
An entry listed as "complete"
An entry listed as "static"
An entry listed as "incomplete"
An entry listed as "dynamic"
An entry listed as "incomplete"