Checkpoint Exam: Network Access Answers

Networking Basics Checkpoint Exam: Network Access Answers 1. Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.) transport network data link session physical 2. Which three acronyms/initialisms represent standards organizations? (Choose three.) TCP/IP MAC OSI IANA IETF IEEE 3. …

Checkpoint Exam: Build a Small Network Answers

Networking Basics Checkpoint Exam: Build a Small Network Answers 1. What is the order of bandwidth measurement from smallest to largest? Gbps, Tbps, Mbps, Kbps Tbps, Mbps, Kbps, Gbps Kbps, Mbps, Gbps, Tbps Kbps, Tbps, Mbps, Gbps 2. Which is a characteristic of the Internet? It is not …

3.0.1.2 Stormy Traffic Instructions Answers

3.0.1.2 Stormy Traffic (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objective Explain the purpose of the Spanning Tree Protocol (STP) in a switched LAN environment with redundant switch links. Instructor Notes: Spanning Tree Protocol (STP) and …

2.2.2.5 Lab – Troubleshooting Inter-VLAN Routing Answers

2.2.2.5 Lab – Troubleshooting Inter-VLAN Routing (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/1.1 192.168.1.1 255.255.255.0 N/A G0/1.10 192.168.10.1 255.255.255.0 N/A G0/1.20 192.168.20.1 255.255.255.0 …

Network Defense (NetDef) Course Final Exam Answers

Network Defense (NetDef) Course Final Exam Answers Modules 1 – 11 of the Network Defense (NetDef) course Final Answers 1. What is a characteristic of a layered defense-in-depth security approach? When one device fails, another one takes over. One safeguard failure does not affect the effectiveness of other …

Checkpoint Exam: Evaluating Security Alerts Answers

Module Group Exam 3: Network Defense (NetDef) Module 9 – 11 Group Exam – Checkpoint Exam: Evaluating Security Alerts 1. Which two technologies are primarily used on peer-to-peer networks? (Choose two.) Darknet Snort BitTorrent Bitcoin Wireshark 2. Which technique would a threat actor use to disguise traces of …