A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?

A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.224 255.255.255.240 255.255.255.192 255.255.255.128 For more question and answers: Click Here CCNA1 v7 – ITNv7 – Final Exam Answers […]
Continue reading…

 

What are two functions that are provided by the network layer? (Choose two.)

What are two functions that are provided by the network layer? (Choose two.) carrying data between processes that are running on source and destination hosts directing data packets to destination hosts on other networks providing dedicated end-to-end connections placing data on the network medium providing end devices with a unique network identifier For more question […]
Continue reading…

 

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet? when the values of both the Echo Request and Echo Reply messages reach zero when the value in the TTL field reaches zero when the router receives an […]
Continue reading…

 

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.) Two devices are attached to the switch. The default SVI has been configured. The switch can be remotely managed. Two physical interfaces have been configured. Passwords have been configured on the switch. One device […]
Continue reading…

 

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) Destination MAC addresses will never change in a frame that goes across seven routers. A packet that has crossed four routers has changed the destination IP address four times. Every time a frame is encapsulated […]
Continue reading…

 

Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? 172.168.10.65 172.168.10.99 AA:AA:AA:AA:AA:AA CC:CC:CC:CC:CC:CC BB:BB:BB:BB:BB:BB DD:DD:DD:DD:DD:DD For more question and answers: Click Here CCNA1 v7 – ITNv7 – Final Exam Answers 2020 Full 100%
Continue reading…

 

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall? Trojan horse brute-force attack DoS buffer overflow Explanation: A Trojan horse is software that does something harmful, but is hidden in legitimate software code. A denial of service (DoS) attack results in interruption of network services to users, […]
Continue reading…