Which of the following is MOST likely the cause of the …
A PC technician has installed a new network printer that was preconfigured with the correct static IP address,
subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity,
but the printer will not respond to any network communication attempts. Which of the following is MOST likely
the cause of the problem?
Verify the settings by using the command prompt..
CORRECT TEXT
SIMULATION
After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2,
PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration
tabs.
Instructions: Verify the settings by using the command prompt, after making any system changes. Next, restore
connectivity by making the appropriate changes to the infrastructure. When you have completed these steps,
select the Done button to submit.
Which of the following are the reasons?
A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As
a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The
company gateway router has the following interface configuration facing the ISP:
Interface A:
IP address: 10.10.150.16
Subnet mask: 255.255.255.240
Default gateway: 10.10.150.32
Speed: 1000 Mbps
Duplex: Auto
State: No Shutdown
None of the workstations at the company are able to access the Internet. Which of the following are the
reasons? (Select TWO).
Which of the following is the reason for the computer i…
A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The
network engineer analyzes the following output from a command line utility:
Network DestinationNetmaskGatewayInterface
192.168.1.0 255.255.255.0192.168.1.254eth0
192.168.1.10255.255.255.255192.168.1.10eth0
127.0.0.1255.0.0.0On-Linlo
127.0.0.0255.0.0.0On-Linklo
255.255.255.255255.255.255.255102.168.1.10eth0
Which of the following is the reason for the computer issue, given the above output?
Which of the following will allow the administrator to …
After connecting a workstation directly to a small business firewall, a network administrator is trying to manage
it via HTTPS without losing its stored configuration. The only two pieces of information that the network
administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e,
and the administrator’s password. Which of the following will allow the administrator to log onto the firewall via
HTTPS if the management’s IP address is unknown and the administrator’s workstation IP address is
192.168.0.10/23?
Which of the following will allow the technician to per…
A network technician is performing a tracert command to troubleshoot a website-related issue. The following
output is received for each hop in the tracert:
1 * * * Request timed out.
2 * * * Request timed out.3 * * * Request timed out.
The technician would like to see the results of the tracert command. Which of the following will allow the
technician to perform tracert on external sites but not allow outsiders to discover information from inside the
network?
which of the following has the technician learned about…
A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo”
command to list information about the existing condition.
myClient$ wificard –getinfoagrCtlRSSI:-72
agrExtRSSI:0
state:running
op mode: station
lastTxRate:178
MaxRate:300
802.11 auth:open
link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless
Channel:149,1
Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
Which of the following steps of incident handling has b…
A network technician was tasked to respond to a compromised workstation. The technician documented the
scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of
incident handling has been incorrectly performed?
Which of the following forensics actions should Ann perform?
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the
directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files
and believes it contains illegal material. Which of the following forensics actions should Ann perform?
Which of the following is a security benefit gained fro…
Which of the following is a security benefit gained from setting up a guest wireless network?