HOTSPOT Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Range Given: 172.30.232.0/24
Finance 32 devices
Marketing 9 devices
INSTRUCTIONS
Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.
After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic.
All drop downs must be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?
A. Physical diagram
B. Heat map
C. Asset list
D. Device map
The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?
A. 1
B. 3
C. 4
D. 5
Which of the following backup techniques is used to capture all the data that has changed since the least full backup?
A. Incremental
B. Replica
C. Different
D. Snapshot
Which of the following DNS record types allows IPv6 records to be resolved to DNS names?
A. PTR
B. A
C. AAAA
D. SRV
A new network technician has received reports that the company network is performing slowly. Being unfamiliar with the company network performance, which of the following should the technician use to verify if the issue is an irregular occurrence based on company use?
A. A bandwidth test
B. SNMP logs
C. A protocol analyzer
D. A network baseline
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?
A. 0
B. 1
C. 2
D. 6
E. 12
A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users' devices to the company network. To complete this step, which of the following should be used to secure the remote network location?
A. Host-based firewalls
B. WPA2/WPA
C. Open access
D. Port filtering
A network extension needs to be run to a location 500ft(152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.)
A. Cat 6 with a repeater placed in the middle of the run
B. Cat 7
C. Crossover cable
D. Fiber-optic cabling
E. Cat 7 with a patch panel placed in the middle of the run
Which of the following technologies should be used in high-throughput network to reduce network overhead?
A. iSCSI
B. QoS tags
C. Port aggregation
D. Jumbo frames