Which networking strategy efficiently uses the addresses allocated to your organization?
You are an administrator for a large organization that uses a single registered Class B address range. Your organization contains a number of departments that range in size from 25 to 400 employees. Each department is to be given its own separate range of network addresses.
Which networking strategy efficiently uses the addresses allocated to your organization?
Which two are characteristics of the RDISC protocol on a Solaris 10 OS system?
Which two are characteristics of the RDISC protocol on a Solaris 10 OS system? (Choose two.)
Which two commands are used to ensure that the default route is installed immediately and at the next reboot?
The system administrator needs to configure a static, default route to 192.168.0.1. The netmask is 255.255.255.240. Which two commands are used to ensure that the default route is installed immediately and at the next reboot? (Choose two.)
Which two commands enable you to perform these tasks?
You have configured an IPv6 router that is having problems routing correctly to a default router connected to the Internet. You need to investigate the machine’s routing table and check that the default route is in place. You also need to check the neighbor cache to see whether the MAC address of the default router has been learned. Which two commands enable you to perform these tasks? (Choose two.)
Which routing protocol is best suited to prepare for this implementation?
To more efficiently allocate and manage their network infrastructure, the Network Company is implementing Classless Inter-Domain Routing. Which routing protocol is best suited to prepare for this implementation?
Which information is found in TCP segment headers?
Which information is found in TCP segment headers? (Choose two.)
Which command do you execute to list the inactive rule set and make it active?
Your network is made of many servers running many services. One of these systems is named system-ssh, which is an ssh server. The ssh server is on Solaris 10 OS with the packet filter enabled and configured. The rule set is:
pass in quick proto tcp from any to any port = 22 keep state block in all
Due to maintenance on the ssh software, a telnet connection must be used instead. You change the rule set in:
pass in quick proto tcp from any to any port = 23 keep state block in all
These are added as an inactive rule set to the ipf kernel module of Solaris 10 OS.
Which command do you execute to list the inactive rule set and make it active?
Which Solaris IP Filter rule should you use to achieve this?
You want to log the TCP packets your web server is receiving, without blocking any traffic. Which Solaris IP Filter rule should you use to achieve this?
Which two lines should be added to the Solaris IP Filter configuration file to pass the required connection re
You are tasked with securing a web server running Solaris 10 OS. You must use the Solaris IP Filter software to only accept incoming connection requests to the following ports:
ssh
http
The IP address of the server is 10.0.0.1.
Which two lines should be added to the Solaris IP Filter configuration file to pass the required connection requests? (Choose two.)
Which command accomplishes this?
The system administrator of a firewall running Solaris IP Filter writes an updated set of rules in /root/newrules. Before implementing the rules, the rule set needs to be tested for syntax errors. Which command accomplishes this?