<< Prev Question Next Question >>

Question 3/39

You are tasked with verifying the following requirements are met in order to ensure network security.
Requirements:
Datacenter
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic Building A Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide devices to support 5 additional different office users Add an additional mobile user Replace the Telnet server with a more secure solution Screened subnet Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a server to handle external 80/443 traffic Provide a server to handle port 20/21 traffic INSTRUCTIONS Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.
Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (39q)
Question 1: After running a Cat 8 cable using passthrough plugs, an elec...
Question 2: Which of the following should a network administrator config...
Question 3: You are tasked with verifying the following requirements are...
Question 4: An organization has a security requirement that all network ...
Question 5: A network technician needs to resolve some issues with a cus...
Question 6: A network administrator is configuring a wireless network wi...
Question 7: A systems administrator is investigating why users cannot re...
Question 8: As part of an attack, a threat actor purposefully overflows ...
Question 9: A technician is troubleshooting a user's laptop that is unab...
Question 10: You have been tasked with implementing an ACL on the router ...
Question 11: A network engineer receives a vendor alert regarding a vulne...
Question 12: Which of the following network topologies contains a direct ...
Question 13: A network administrator notices interference with industrial...
Question 14: Which of the following is a cost-effective advantage of a sp...
Question 15: Which of the following most likely requires the use of subin...
Question 16: To reduce costs and increase mobility, a Chief Technology Of...
Question 17: A network technician is troubleshooting a web application's ...
Question 18: An administrator is setting up an SNMP server for use in the...
Question 19: A network administrator has been taskedwith configuring a ne...
Question 20: A network administrator wants to configure a backup route in...
Question 21: A network technician was recently onboarded to a company. A ...
Question 22: A network administrator is notified that a user cannot acces...
Question 23: Which of the following routing protocols uses an autonomous ...
Question 24: Which of the following requires network devices to be manage...
Question 25: Which of the following most likely determines the size of a ...
Question 26: Users cannot connect to an internal website with an IP addre...
Question 27: Which of the following steps of the troubleshooting methodol...
Question 28: Which of the following network devices converts wireless sig...
Question 29: A company receives a cease-and-desist order from its ISP reg...
Question 30: Which of the following attacks would most likely cause dupli...
Question 31: A network administrator wants users to be able to authentica...
Question 32: A network engineer is now in charge of all SNMP management i...
Question 33: Which of the following can support a jumbo frame?...
Question 34: A network manager wants to implement a SIEM system to correl...
Question 35: Which of the following attacks utilizes a network packet tha...
Question 36: Which of the following fiber connector types is the most lik...
Question 37: Which of the following describes the best reason for using B...
Question 38: A network engineer is designing a secure communication link ...
Question 39: A network administrator for a small office is adding a passi...