Drag each category on the left to its corresponding router output line on the right.
Drag the option on the left that best describes the unique advantage and disadvantage of each WAN link type
Drag the addresses to fill in the NAT terminology table with their associated IP address values.
Drag each appropriate option on the left to its proper placeholder on the right.
What are two reasons that the network administrator would use access lists?
Move your mouse over a router to view its configuration.
DRAG DROP
A dental firm is redesigning the network that connects its three locations. The administrator gave
the networking team 192.168.164.0 to use for addressing the entire netwok. After subnetting the
address, the team is ready to assign the addresses. The administrator plans to configure ip
subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you
must address the network and at the same time conserver unused addresses for future growth.
With those goals in mind, drag the host addresses on the left to the correct router interface. Once
of the routers is partially configured. Move your mouse over a router to view its configuration. Not
all of the host addresses on the left are necessary.
Exhibit:
Place the Spanning-Tree Protocol port state on its function by dragging the state on the left to…
Drag and drop question. Drag the items to the proper locations.
Drag the items on the left to the proper locations.
You are required to fill in the protocol, address, and mask in this command using the choices below:
DRAG DROP
You are configuring the office. In particular the host C, with the IP address 192.168.125.34/27,
needs to be configured so that it cannot access hosts outside its own subnet. You decide to use
the following command:
access-list 100 deny protocol address mask any
You are required to fill in the protocol, address, and mask in this command using the choices
below: