What are two common TCP applications? (Choose two.)
Correct Answer: BD
SMTP uses TCP port 25, 010-151 dumps070-243 exam070-341 dumps070-347 dumps70-410 dumps070-410 dumps070-413 dumpswhile FTP uses TCP ports 20 and 21. Reference: http://
Refer to the exhibit.
What two things can the technician determine by successfully pinging from this computer to the IP address 172.16.236.1? (Choose two)
A. The network card on the computer is functioning correctly.
B. The default static route on the gateway070-461 dumps070-463 dumps070-464 dumps070-483 dumps070-487 dumps070-489 dumps router is correctly configured.
C. The correct default gateway IP address is configured on the computer.
D. The device with the IP address 172.16.236.1 is reachable over the network.
E. The default gateway at 172.16.236.1 is able to forward packets to the internet.
Correct Answer: AD
The source and destination addresses are on the same network therefore, a default gateway is not necessary for
communication between these two addresses.
A company has placed a networked PC in a lobby so guests can have access to the corporate directory.
A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)
A. Enable port security.
B. Create 101 exam101-400 exam117-201 dumps117-202 dumps1K0-001 dumpsthe port as a trunk port.
C. Create the port as an access port.
D. Create the port as a protected port.
E. Set the port security aging time to 0.
F. Statically assign the MAC address to the address table.
G. Configure the switch to discover new MAC addresses after a set time of inactivity.
Correct Answer: ACF
If port security is enabled and the port is only designated as access port, and finally static MAC address is assigned, it
ensures that even if a physical connection is done by taking out the dire
After the network has converged, what type of messaging, if any, occurs between R3 and R4?
A. No messages are exchanged
B. Hellos are sent every 10 seconds.
C. The full database from each router is sent every 30 seconds. 210-250-dumps210-255-dumps200-150-dumps200-155-dumps300-160-dumps300-165-dumps
D. The routing table from each router is sent every 60 seconds.
Correct Answer: B
HELLO messages are used to maintain adjacent neighbors so even when the network is converged, hellos are still
exchanged. On broadcast and point-to-point links, the default is 10 seconds, on NBMA th
Which dynamic routing protocol uses only the hop count to determine the best path to a destination?
D. OSPF Correct Answer: C Explanation/Reference:
Refer to the topology and partial configurations shown in the exhibit.
The network administrator has finished configuring the NewYork and Sydney routers and issues the command ping Sydney from the NewYork router. The ping fails. What command or set of commands should the network administrator issue to correct this problem?
A. Sydney(config)# interface s0/0 Sydney(config-if)#cdp enable
B. Sydney(config)# interface s0/0 Sydney(config-if)# no shut
C. Sydney(config)# line vty 0 4 Sydney(config)# login Sydney(config)# password Sydney
D. Sydney(config)# ip host Sydney 10.1.1.9
E. Sydney(config)# interface s0/0 Sydney(config-if)#ip address 10.1.1.5 255.255.255.252 NewYork(config)# ip host Sydney 10.1.1.5 Correct Answer: E
Explanation/Reference: Explanation: The IP addresses on the two 300-170 dumps300-175 dumps300-180 dumps300-210 dumps600-509 dumps600-510 dumps Serial interfaces of two routers are not in the same subnet so they could not recognize each other and the ping failed. Therefore we must correct the IP addr
An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?
A. Router# show startup-config
B. Router# show current-config
C. Router# show running-config
D. Router# show memory
E. Router# show flash
F. Router# show processes Correct Answer: C Explanation/Reference: This command followed by the appropriate parameter will show the running config hence the admin will be able to see
what changes have been made, and then they can be saved.
Which protocol uses a connection-oriented service to deliver files between end systems?
E. RIP Correct Answer: C Explanation/Reference: TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two
processes before data is exchanged. The connection must be maintained during t
Which statement about a router on a stick is true?
A. Its date plane router traffic for a single VI AN over two or more switches. 200-125 dumps100-105 dumps210-260 dumps300-115 dumps200-105 dumps300-101 dumps200-310 dumps
B. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs on the same subnet.
C. It requires the native VLAN to be disabled.
D. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs.
Correct Answer: D
Refer to the exhibit.
Assume that all router interfaces are operational and correctly configured. In addition, assume that OSPF has been correctly configured on router R2. How will the default route configured on R1 affect the operation of R2?
A. Any packet destined for a network that is not directly connected to router R2 will be dropped immediately.
B. Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1. R1 will 210-060 dumps200-355 dumps640-911 dumps300-075 dumps300-320 dumps300-208 dumps then send that packet back to R2 and a routing loop will occur.
C. Any packet destined for a network that is not directly connected to router R1 will be dropped.
D. The networks directly connected to router R2 will not be able to communicate with the 172.16.100.0, 172.16.100.128, and 172.16.100.64 subnetworks.
E. Any packet destined for a network that is not directly connected to router R2 will be dropped immediately because of the lack of a gateway on R1. Correct Answer: B
Explanation/Reference: First, notice that the more-specific routes will always be favored over less-specific routes regardless of the administrative distance set for a protocol. 300-135 dumps210-065 dumps300-206 dumps300-070 dumps300-209 dumps300-360 dumps642-998 dumpsIn this case, because we use OSPF for three
Which IP address is a private address? A. 188.8.131.52 B. 184.108.40.206 C. 172.20.14.36 D. 220.127.116.11
Correct Answer: C
Refer to the exhibit.
Frequently Asked Questions
1. Where are we based?
We do parties in and around Cape Town including the Northern and Southern suburbs as well as the Southern Peninsula. A small petrol fee is required for areas outside of Cape Town.
2. What do we supply?
We come fully equipped with everything that is needed to hold the perfect pamper party. This includes, towels, face clothes, table cloths, extension leads, all equipment needed for the pamper stations and more.
Depending on which package you order, we will also bring along decorations for the party.
3. What do I, as the Mom, need to supply for the party?
All you will need to supply is the basics of tables and chairs, water and electrical points, and if you wish some yummy snacks and treats for the guests. We do offer a variety of baked goods to save any hassle of ordering elsewhere.
4. Do we provide a party venue?
Unfortunately, we do not have a party venue as of yet.
5. What is the duration of the party?
Depending on the package you choose, our parties can range from 2-3 hours.
6. Do our parties have a colour scheme?
Our colour scheme is hot pink and purple and all equipment is of this colour. We do, however offer themed pamper parties.
7. Do we supply tables and chairs?
For your convenience, we hire out our Kiddies Chairs including our pink and purple chair covers to make life a lot easier for parents who are in need of the extra seating. We do not unfortunately supply tables.
8. What is the maximum amount of guests per party?
Depending on availability of our Party hostesses, we don’t have a maximum, however there is an additional cost per guest thereafter 10 guests attending.
9. Who are our Party Hostesses?
We have a professional team of fun and interactive party hostesses that will come to your home or party venue of your choice to create the best party for your little Girl. There is 1 party hostess for every 5 guests to ensure everyone receive our undivided attention. Our party hostesses will arrive at the party venue 30min prior to the start of the party to set up your daughter’s Pretty Pamper Party.
10. What are the age groups we aim at?
Depending on the package that you choose we supply a pamper services for all girls up to the age of 12 + as we also provided a Moms pampering services that aim at teens and moms.
For any further questions, please don’t hesitate to contact us.
Have any questions/queries or want to book a party with us?