IT Questions Bank Match the command with the device mode at which the command is entered. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA, Networking Devices and Initial Configuration, Networking EssentialsA law firm uses DHCPv4 to dynamically assign IPv4 addresses for staff workstations. The DHCP policy specifies that the lease period is 7 days. A staff member returns to the office after 2 weeks of vacation. When the employee turns on the workstation, which DHCPv4 message is sent by the workstation to obtain a valid IPv4 address?ITExamAnswers asked 3 years ago • Networking EssentialsRefer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured?ITExamAnswers asked 3 years ago • Network Fundamentals, Networking EssentialsWhich statement describes a major characteristic of a local area network?ITExamAnswers asked 3 years ago • Networking EssentialsWhat are two functions of a router? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v4, CCNA 2 v6, CCNA 3 v6, CCNA 3 v7, Networking Basics, Networking EssentialsWhich protocol is used by a server that needs to send an email message to another server in order to support successful delivery of the message?ITExamAnswers asked 3 years ago • Networking EssentialsA corporate office is considering using an MDM policy to enhance its security parameters. What is achieved through the implementation of the MDM policy?IT Administrator asked 1 year ago • IT Essentials 8Which three IP addresses are considered private addresses? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Networking EssentialsWhat technique is used in social engineering attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking EssentialsA network administrator attempted to access the company website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?ITExamAnswers asked 3 years ago • Networking EssentialsWhich is a characteristic of a Type 2 hypervisor?ITExamAnswers asked 4 years ago • CCNA, IT Essentials, IT Essentials 8, Networking Devices and Initial ConfigurationWhich two devices are shared peripherals? (Choose two.)ITExamAnswers asked 3 years ago • Networking EssentialsWhich three factors should be considered when choosing the appropriate network media? (Choose three.)ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsWhat are three characteristics of UTP cabling? (Choose three.)ITExamAnswers asked 3 years ago • Networking EssentialsWhich interface allows remote management of a Layer 2 switch?ITExamAnswers asked 4 years ago • CCNA, Networking Essentials