A user experiences access and performance issues with the Internet connection from a home computer. The Internet connection is provided through a DSL line. The user calls the support line of the phone company for help. The support technician asks the user to connect the computer directly to the DSL modem. Which two pieces of information will help the technician to troubleshoot the problem? (Choose two.)

A user experiences access and performance issues with the Internet connection from a home computer. The Internet connection is provided through a DSL line. The user calls the support line of the phone company for help. The support technician asks the user to connect the computer directly to the DSL modem. Which two pieces of […]
Continue reading…

 

How does an activity LED on wireless routers indicate that traffic is moving through a port?

How does an activity LED on wireless routers indicate that traffic is moving through a port? by flashing by staying turned off by staying a solid green color by staying a solid amber color Answers Explanation & Hints: One of the first steps when using the bottom-up strategy of troubleshooting is to examine the LED […]
Continue reading…

 

Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)

Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.) IP address DHCP server subnet mask default gateway DNS server MAC address Answers Explanation & Hints: The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the […]
Continue reading…

 

Which utility can be used to view a list of open TCP connections on Linux or Windows systems?

Which utility can be used to view a list of open TCP connections on Linux or Windows systems? Tracert Ping Netstat Ipconfig Answers Explanation & Hints: Netstat is a utility that is available for both Linux and Windows systems. It is a utility that can be used to indicate that something or someone is connected […]
Continue reading…

 

For the second time in a week, workstations on a LAN are not able to log into a specific server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?

For the second time in a week, workstations on a LAN are not able to log into a specific server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking questions of end users […]
Continue reading…

 

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC […]
Continue reading…

 

What advantage does SSH offer over Telnet?

What advantage does SSH offer over Telnet? encryption more connection lines connection-oriented services username and password authentication Answers Explanation & Hints: Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted […]
Continue reading…

 

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) Configure the IP domain name on the router. Enable inbound vty Telnet sessions. Generate the SSH keys. Configure DNS on […]
Continue reading…

 

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) VTY interface console interface Ethernet interface boot IOS mode privileged EXEC mode router configuration mode Answers Explanation & Hints: Access to the VTY and console interfaces can […]
Continue reading…