A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection? Add a second NIC to the web server. Add another web server to prepare failover support. Add […]
Continue reading…

 

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.) nslookup cisco.com net cisco.com ping cisco.com nbtstat cisco.com ipconfig /flushdns Answers Explanation & Hints: The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the […]
Continue reading…

 

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task? show running-config show interfaces copy running-config startup-config show ip nat translations For more question and answers: Click Here CCNA 1 […]
Continue reading…

 

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model? Both stateful and packet-filtering firewalls can filter at the application layer. A stateful firewall can filter application layer information, whereas a packet-filtering firewall cannot filter beyond the network layer. A packet-filtering firewall typically can filter up to the […]
Continue reading…

 

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to guess a password to access the router a worm that is attempting to access another part of the network an unidentified individual who is trying […]
Continue reading…

 

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville? Trojan horse reconnaissance DoS access Answers […]
Continue reading…

 

Which command is used to manually query a DNS server to resolve a specific host name?

Which command is used to manually query a DNS server to resolve a specific host name? nslookup ipconfig /displaydns tracert net Answers Explanation & Hints: The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created […]
Continue reading…

 

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. […]
Continue reading…

 

What service is provided by POP3?

What service is provided by POP3? Retrieves email from the server by downloading the email to the local mail application of the client. Allows remote access to network devices and servers. Uses encryption to provide secure remote access to network devices and servers. An application that allows real-time chatting among remote users. For more question […]
Continue reading…

 

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​ router solicitation route redirection neighbor solicitation protocol unreachable router advertisement Answers Explanation & Hints: The ICMP messages common to both ICMPv4 and ICMPv6 include: host confirmation, destination (net, host, protocol, port) or service unreachable, time exceeded, and route redirection. Router solicitation, […]
Continue reading…

 

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish? checking the IP address on the network card testing the integrity of the TCP/IP stack on the local machine pinging a host computer that has the IP address 127.0.0.1 on the network tracing the path […]
Continue reading…