0 of 40 Questions completed
Questions:
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
0 of 40 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Next to each port number, type the protocol of its use.
1. Port 21 –
2. Port 23 –
3. Port 25 –
4. Port 53 –
Drag each port to the protocol of its use.
SSH
|
|
DHCP
|
|
TFTP
|
|
HTTP
|
|
Drag each protocol to the port of its use.
22
|
|
110
|
|
123
|
|
143
|
|
5 GHz
|
|
2.4 GHz / 5 GHz
|
|
2.4 GHz
|
|
Drag and drop the various 802.11 wireless standards into the frequencies of its use.
5 GHz
|
|
2.4 GHz / 5 GHz
|
|
2.4 GHz
|
|
Drag and drop the various 802.11 wireless standards into the speeds of its use.
Up to 54Mbps
|
|
Up to 11Mbps
|
|
Up to 600Mbps
|
|
|
|
|
|
Wireless network details Network ID: 192.168.1.0/24 SSID: Veronica-Wireless Neighbors channels: 6,11
Configure Veronica’s wireless network using the Wireless network details.
Wireless configuration.
SSID:
Network ID: . . .
Subnet Mask: . . .
Wireless Channel:
Device A |
|
Device B |
|
Device C |
|
A collection of devices connected together in one physical location, such as a building
|
|
A network that extends over a large geographic area for the primary purpose of computer networking
|
|
A computer network for interconnecting electronic devices within an individual person's workspace
|
|
A network that connects computers within a metropolitan area, which could be a single large city
|
|
|
|
|
|
The network administrator has changed the DHCP settings and now your computer is unable to get an IP address, subnet mask, and default gateway IP address. The network administrator asks you to send him a screenshot of your TCP/IP configuration values.
Type the command to reveal the network details of your workstation.
c:\>
The network administrator has changed the IP address of ComputerA from 192.168.1.1 to 192.6.7.8 and now George, a user, is unable to connect to internal file shares on ComputerA from ComputerB.
Type the command to test the connectivity between ComputerB and ComputerA.
c:\>
|
|
|
|
On-demand access to cloud-hosted physical and virtual servers, storage, and networking
|
|
On-demand access to a complete, ready-to-use, cloud-hosted platform for developing, running, maintaining, and managing applications
|
|
On-demand access to ready-to-use, cloud-hosted application software.
|
|
Sort the layers (from layer 1 to layer 7) to form the OSI Model.
View Answers:
Match the network topology to the description.
Each computer and network device is interconnected with one another
|
|
All the nodes are connected to a single cable
|
|
Each node connects to exactly two other nodes
|
|
Each individual piece of a network is attached to a central node
|
|
Match the pin numbers with their wire colors to create the 568A Standard.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Match the pin numbers with their wire colors to create the 568B Standard.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Drag each connector type into its respective place.
|
|
|
|
Match the IP addresses to their default subnet mask
181.1.1.2
|
|
23.1.1.2
|
|
195.2.4.5
|
|
Fill up the table by typing the class, the network IDs, and the network broadcast from the following IP addresses.
IP Address |
Class |
Network ID |
Network
|
---|---|---|---|
2.3.4.1 |
|
|
|
130.1.2.3 |
|
|
|
209.7.8.9 |
|
|
|
Drag each IPv4 message to the description of its use.
Messages are sent to all stations in the network
|
|
The message is only sent to one station on the network
|
|
Messages are sent to a group of stations
|
|
Next to each protocol type the port number of its use.
1. Internet Message Access Protocol (IMAP) –
2. Lightweight Directory Access Protocol (LDAP) –
3. Hypertext Transfer Protocol Secure (HTTPS) –
4. SMTP TLS –
Match the networking device to the description.
The process of distributing a set of tasks over a set of resources.
|
|
A server application that acts as an intermediary between a client requesting a resource and the server providing that resource
|
|
A type of network bridge that provides bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial
|
|
A device that creates a wireless local area network, or WLAN, usually in an office or large building
|
|
Type next to each route type the default Administrative Distances (AD).
EIGRP (internal routes) –
OSPF –
EIGRP (external routes) –
BGP –
Drag each type of attack to the description of its use.
Fake information is entered into the cache of a domain name server
|
|
A computer security exploit, a method of attacking networked resources on a virtual local area networks
|
|
A type of attack in which a malicious actor sends falsified Address Resolution Protocol messages over a local area network
|
|
The creation of Internet Protocol packets with a false source IP address, for the purpose of impersonating another computing system
|
|
Drag each social engineering attack to the description of its use.
A type of social engineering attack often used to steal user data, including login credentials and credit card numbers
|
|
Thieves steal your personal data by spying over your shoulder as you use a laptop, ATM, public kiosk, or another electronic device in public
|
|
Attackers seeking entry to a restricted area without proper authentication. In it, the perpetrators can simply follow an authorized person into a restricted location
|
|
Type the command that produces the following output.
R1#
You are troubleshooting a faulty network. You need to illustrate the route packets take through the inter-network in order to identify the weak spot. Assuming you are working on a Windows environment, type the command to find where the packets are dropped.
C:\>
You are working on a Cisco Router. You are in User Exec mode and you need to display the startup configuration to troubleshoot an issue. Type the command to display the startup configuration settings.
Router>
You are at a Windows 10 workstation and have a command prompt open. Type the command to view resource record information on a particular DNS server.
C:\>
You are working at a Linux command prompt. You need to find the A record from the website dojopass.org to troubleshoot DNS-related issues. Type the command to display the records from the dojolab DNS server.
student@dojolab:~$
Type the command to view the Internet Protocol (IP) configuration on a Linux host.
student@dojolab:~$
Type the Windows command-line utility that produces the following output.
1 <1 ms <1 ms <1 2 7 ms 3 ms 4 ms 3 45 ms 23 ms 19 ms 4 11 ms 29 ms 28 [202.1.56.23] 5 26 ms 29 ms 29 [199.12.87.26] 6 * * * Request timed out. 7 56 ms 67 ms 99 ms be11.trmc15-01.ars.mgmt.hox1 [156.168.0.3] 8 * * * Request timed out. 9 222 ms 222 ms 198 ms be13.trmc35-01.ars.mgmt.hox37 [164.168.0.4]
C:\>
Type the Windows command-line utility that produces the following output.
Reply from 1.2.3.4: bytes=32 time=25ms TTL=53 Reply from 1.2.3.4: bytes=32 time=77ms TTL=53 Reply from 1.2.3.4: bytes=32 time=23ms TTL=53 Reply from 1.2.3.4: bytes=32 time=67ms TTL=53 Statistics for 1.2.3.4: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 67ms, Maximum = 89ms, Average = 56ms
C:\>
Type the Windows command-line utility that produces the following output.
Active Connections Proto Local Address Foreign Address State TCP 127.0.0.1:7869 CZ111:49770 ESTABLISHED TCP 127.0.0.1:49770 CZ222:7869 ESTABLISHED TCP 127.0.0.1:25678 CZ333:25678 ESTABLISHED TCP 192.168.44.55:4567 RJ-N22P:42173 ESTABLISHED TCP 192.168.44.55:4567 RJ-N22P:44356 ESTABLISHED TCP 192.168.44.55:49770 autodiscover:https ESTABLISHED TCP 192.168.44.55:49770 autodiscover:https ESTABLISHED TCP 192.168.44.55:25678 91-14-55-5:https ESTABLISHED
C:\>
You need to verify the connection to 192.168.0.10 on port 25 and the connection to 192.168.0.11 on port 80 with the help of the telnet command. Type the Windows command-line utility to verify the connections.
1. C:\>
2. C:\>
You are working at a Linux command prompt. You need to capture and analyze packets from the ethernet interface 0 using the tcpdump command. Type the command to start capturing the packets.
student@dojolab:~$