A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment?

A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment? https:// /author1a #page100 /book2.html Answers Explanation & Hints: In the website URI https://www.books-info.com/author1a/book2.html#page100 , the components include the following: Protocol/scheme – HTTPS, FTP, SFTP, mailto, NNTP, etc. Hostname – www.books-info.com Path and file name […]
Continue reading…

 

Refer to the exhibit. Which data format is used to represent the data for network automation applications?

Refer to the exhibit. Which data format is used to represent the data for network automation applications? XML HTML YAML JSON Answers Explanation & Hints: Common data formats that are used in many applications including network automation and programmability include these: JavaScript Object Notation (JSON) – In JSON, the data known as an object is […]
Continue reading…

 

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​ Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Answers Explanation & Hints: The SDN control plane uses the Layer 2 ARP table and the Layer 3 routing table to make decisions about […]
Continue reading…

 

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance? virtual machine bare metal type 1 type 2 Answers Explanation & Hints: Type 2 hypervisors, also know as hosted hypervisors, are installed on top of an existing operating system, such as Mac OS, […]
Continue reading…

 

What is a difference between the functions of Cloud computing and virtualization?

What is a difference between the functions of Cloud computing and virtualization? Cloud computing utilizes data center technology whereas virtualization is not used in data centers. Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. […]
Continue reading…

 

Which type of tool would an administrator use to capture packets that are going to and from a particular device?

Which type of tool would an administrator use to capture packets that are going to and from a particular device? NMS tool knowledge base baselining tool protocol analyzer Answers Explanation & Hints: Protocol analyzers capture packets as they enter or leave a device and can display those packets in real time. An NMS tool is […]
Continue reading…

 

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach? Ask the user to launch the web browser. Ask the user to save the working document. Ask […]
Continue reading…

 

A network technician has used the access-llst 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?

A network technician has used the access-llst 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing […]
Continue reading…

 

Which two methods help to prevent the disruption of network services? (Choose two.)

Which two methods help to prevent the disruption of network services? (Choose two.) using VLANs to segment network traffic changing the routing protocols at regular intervals installing duplicate equipment to provide failover services using redundant connections to provide alternate physical paths removing switches which cause loops Answers Explanation & Hints: Using duplicate equipment and using […]
Continue reading…

 

What is a characteristic of the distribution layer in the three layer hierarchical model?

What is a characteristic of the distribution layer in the three layer hierarchical model? acts as the backbone for the network, aggregating and distributing network traffic throughout the campus provides access to the rest of the network through switching, routing, and network access policies distributes access to end users represents the network edge Answers Explanation […]
Continue reading…