IT Questions Bank Refer to the exhibit. A network administrator is doing proactive network maintenance. The administrator pings 192.168.1.100 and compares the results to the baseline data. Based on the comparison of the two pings, what is one possibility?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. Based on the output shown, to which IP network should the workstations in the Support department belong?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. An administrator notes a significant increase in the amount of traffic entering the network from the ISP. The administrator clears the access-list counters. After a few minutes, the administrator again checks the access-list table. What can be concluded from the most recent output shown?ITExamAnswers asked 7 months ago • CCNA Discovery v4A security administrator wants to secure password exchanges on the vty lines on all routers in the enterprise. What option should be implemented to ensure that passwords are not sent in clear text across the public network?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which ACL permits host 10.220.158.10 access to the web server 192.168.3.244?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. A network administrator needs to configure an access list that will allow the management host with an IP address of 192.168.10.25/24 to be the only host to remotely access and configure router RTA. All vty and enable passwords are configured on the router. Which group of commands will accomplish this task?ITExamAnswers asked 7 months ago • CCNA Discovery v4Hosts from the Limerick LAN are not allowed access to the Shannon LAN but should be able to access the Internet. Which set of commands will create a standard ACL that will apply to traffic on the Shannon router interface Fa0/0 implementing this security?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which set of ACL statements meets the stated requirements when they are applied to the Fa0/0 interface of router R2 in the inbound direction?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which three statements are true concerning standard and extended ACLs? (Choose three.)ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. The following commands were entered on RTB. Which addresses do these commands block access to RTB?ITExamAnswers asked 7 months ago • CCNA Discovery v4What effect does the command reload in 30 have when entered into a router?ITExamAnswers asked 7 months ago • CCNA Discovery v4What can an administrator do to ensure that ICMP DoS attacks from the outside are mitigated as much as possible, without hampering connectivity tests initiated from the inside out?ITExamAnswers asked 7 months ago • CCNA Discovery v4ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Discovery v4, CCNA Security, CCNP