Testout Network + Practice Exam
connected a cable modem in the business.
The business has four computers that need to communicate with each other and the Internet. The ISP’s cable modem has only one RJ45 port. You need to set up the network with the following in mind:
• Spend as little money as possible.
• Do not purchase unnecessary equipment.
• Computers need to have a gigabit connection to the network. • New devices should not require management or configuration.
You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs.
What should you purchase?
192.168.1.0/24 subnet.
This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix. : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address . . . . . : 00AABBCC74EF DHCP Enabled. . . . . . . : No
Autoconfiguration Enabled . . : Yes
IPv4 Address. . . . . . . : 192.168.2.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0
Default Gateway. . . . . . : 192.168.1.1
DNS Servers . . . . . . . : 192.168.2.20
What is the most likely cause of the problem?
You now need to apply those security policies to the end users’ mobile devices. What should you do? (Select two. Each response is a part of the complete solution.)
software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?
minimum.
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch.
Will this implementation work?
the MAC address of the attacker’s computer.
You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands:
switch2# show interfaces fa0/1 status
Port Name Status Vlan Duplex Speed Type Fa0/1 connected 3 ahalf a100 10/100BaseTX
switch2# show interfaces Gi0/1 status
Port Name Status Vlan Duplex Speed Type
Gi0/1 connected trunk afull a1000 1000BaseTX
switch2# show interfaces Gi0/2 status
Port Name Status Vlan Duplex Speed Type
Gi0/2 connected trunk afull a1000 1000BaseTX
What is the issue with this network?
2. Establish a theory of probable cause.
3. Test the theory to determine the cause.
4. Establish a plan of action to resolve the problem and identify potential effects.
5. Implement the solution or escalate as necessary.
6. Verify full system functionality and, if applicable, implement preventative measures. 7. Document findings, actions and outcomes.
utility company’s transmission lines to 110 volts that can be used by devices in a data center?
Which 802.11 standards will work best in this situation? (Select two.)
You want the connection to be as secure as possible. Which type of connection will you need?
on the network cable in her office, that she can no longer access the network.
You go to the office and see that one of the user’s stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user’s computer.
What should you do next in your troubleshooting strategy?
(Select two.)
broadcasts the SSID. WPA2 is not supported by the wireless access points.
You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)
; <<>> DiG 8.2 <<>> westsim111.com
;;res options:init recurs defnam dnsrch
;;got answer:
;;>>HEADER<
connect the branch office network to your home office network.
This morning, users at the branch office reported that they can no longer access resources on the home office network.
You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following:
• Interface status: Up
• Protocol status: Down
What is the most likely cause of this WAN issue?
• S0/1/0 is a WAN interface that is connected to an ISP.
• F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. • F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24.
You have configured an access control list on this router using the following rules:
• deny ip 192.168.1.0 0.0.0.255 any • deny ip 192.168.2.0 0.0.0.255 any
These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks.
However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface.
What should you do?
output:
5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms
6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms 38.050 ms
7 oc486yy.Seat.someisp.net (14.248.154.129) 57.440 ms 56.678 ms 57.675 ms
8 t223hghytry.swa.someisp.net (142.133.89.232) 103.041 ms 57.181 ms 56.619 ms
9 t8343mmd.cgssel.someisp.net (162.191.10261) 91.977 ms 93.971 ms 93.767 ms
10 twirem2.cgssfdl.ip.someisp.net (145.97.133.23) 92.463 ms 92.337 ms 93.523 ms
11 twerrm1.nfffsiny.ip.someisp.net (117.116.141.38) 106.000 ms 106.007 ms 105.283 ms
12 gbed22repp0.n5ddsdsy.ip.someisp.net (123.194.132.8) 103.198 ms 105.447 ms 104.263 ms
Which of the following utilities were you using?
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables.
Will this implementation work?
methods is most appropriate?
Which of the following might you suspect as the real cause of the problem?
Which of the following are true in this scenario? (Select three.)
If the link speed is 1000 Mbps or faster, fullduplex is used.
The switch attempts to sense the link speed. If it can’t, the slowest link speed supported on the interface is selected.
• Dual power supplies
• RAID 5 volume
• One RAID controller
• Two 1000 Mbps network adapters
Which component is a single point of failure for the website?
One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised.
Which Intune portal should you use to perform a remote wipe?
When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied.
What is this process called?
However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It’s becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.
What should you do?
Which of the following actions is the remote system most likely to be performing?
What would you use to connect the wiring closets together?
plumber asks you to let him in so he can “fix the restroom.” What should you do?
You move the cable router a distance of 50 meters using RG8 cables and special connector adapters.
Which condition are you most likely to experience?
forwarding.
Which type of switch uses the IP address for making forwarding decisions to optimize network performance?
You would like to implement a device to speed up access to your Web content. The device should be able to distribute requests between the various Web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions.
Which type of device should you choose?
that verifies the identity of the user to the target system?
two.)
two.)
IS-IS
Which utility would you use to track the route a packet takes as it crosses the network?
proposed change?
• IP address: 192.168.23.8 • HTTP Port: 1030
• SSL Port: 443
Users complain that they can’t connect to the website when they type www.westsim.com. What is the most likely source of the problem?
Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video.
What is the most likely cause of this poor WAN performance?
a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems.
You configure the server to distribute IP addresses from 192.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0.
After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server.
Which of the following would explain the failure?
Ticket granting server
10.0.12.15
172.18.188.67
Which of the following best describes the composition of the frame as it travels from A to B?
potential security risk they present to your network.
One day you find that an employee has connected a wireless access point to the network in his office.
What type of security risk is this?
Which 802.11 standard will work best in this situation?
1000BaseLX
commonly used behind a NAT server?
either over the Internet or on a local area network?
device after a short period of inactivity?
Which tool should you use?
When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface.
What does this statistic indicate?
What should you do next?
What could be causing this to happen?
transmission of data? (Select two.)
TLS
on another wire within the same connector?
vendor must perform for a client?
following equipment in your building:
• A wireless television distribution system running at 2.4 GHz
• A wireless phone system running at 5.8 GHz
• A wireless phone system running at 900 MHz
• An 802.11a wireless network running in the 5.725 5.850 GHz frequency range • An 802.11j wireless network running in the 4.9 5.0 GHz frequency range
Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
Internet access for patrons.
The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet.
Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored.
What should you do?
requirement for your plan?
connect the branch office network to your home office network.
This morning, users at the branch office reported that they can no longer access resources on the home office network.
You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following:
• Interface status: Up • Protocol status: Up
What is the most likely cause of this WAN issue?
port?
What could be causing this to happen?
following components will be part of your design? (Select two.)
AES encryption
Stateless
address lease is created or released?
connection to a switch?
reproduce the problem. What should you do next?
specific application running on a device. Which tool should you use?
outlines the process you should follow before implementing that device?
Offers speeds of 400-1,000 Kbps
(Select two.)
802.11i
*Aug 8 11:18:12.081: %LINEPROTO5UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down
What facility generated this message?
Which of the following recommendations should you follow when applying the hotfix?
Which of the following might you suspect as the cause of the connectivity problems?
assets. However, there is still some risk left. What is the remaining risk called?
A user reports that she can’t access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet.
Which of the following is likely the cause of the problem?
connections.
Which of the following network topologies provides redundancy for a failed link?
Increases network performance
Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection.
You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
Install the latest firmware updates from the device manufacturer.
devices have Windows RT preinstalled on them.
To increase the security of these devices, you want to apply a default set of securityrelated configuration settings.
What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
Configure and apply security policy settings in a mobile device management system.
• Enable remote management from the main office.
• Allow users to be managed through Active Directory.
You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible.
Which of the following tasks should you carry out? (Select two.)
Change the default username and password.
are true?
A DHCP server assigns addresses to requesting hosts.
response when an intruder is detected on your network?
RJ45
Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period.
Which 802.11 standard will work best in this situation?
Which Ethernet standard meets these guidelines? (Choose two.)
10GBaseSR
network adapter is defective. You replace the network adapter and verify that it works. What should you do next?
What is the impact on the network?
Lightweight AP – Hubandspoke infrastructure
Intelligent AP – Distributed wireless mesh infrastructure
security threat exists if this user account is used to perform administrative functions?
router from which the information came. What is this technique called?
To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other.
What should you do? (Select two. Each response is a part of the complete solution.)
Configure all wireless access points with client certificates.
What would you use to connect the wiring closets together?
sharing routes?
Which of the following is an acceptable alternative to Telnet?
like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
view and analyze the number of collisions detected on the interface. Which command should you use?
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch.
Will this implementation work?
the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)
How many devices will need to be supported?
Is the business expected to grow in size in the future?
Centralized administration
interconnected using WAN links and routers.
Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office.
To troubleshoot the issue, you have done the following:
• Verified that the server is up and running.
• Verified that the various routers in between the two locations are up and running.
You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 f l 1500 command on your workstation. The ping command returns the following command for each ping packet sent:
“Packet needs to be fragmented but DF set.” What does this mean?
131.9.202.111
Which document type would you update first in response to this new law?
misleading data that incorrectly maps host names and IP addresses?
You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
denial of service attacks directed against other computers on the Internet. Which log would you check to see if this is happening?
connected a cable modem in the business.
The business has four computers that need to communicate with each other and the Internet. The ISP’s cable modem has only one RJ45 port. You need to set up the network with the following in mind:
• Spend as little money as possible.
• Do not purchase unnecessary equipment.
• Computers need to have a gigabit connection to the network. • New devices should not require management or configuration.
You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs.
What should you purchase?
What should you use for this situation?
test your applications on various operating system versions and editions.
Currently, all of your testing virtual machines are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.
To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Both responses are part of the complete solution.)
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Which of the following connector types will you most likely encounter?
workstation to the bus breaks.
Which of the following best describes what happens to network communications?
You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down.
Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit.
What should you do? (Choose two. Each response is a complete solution.)
Enable STP on each switch.
client system did not have difficulty accessing the network.
During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect.
Which of the following might you suspect as the problem?
when working with computer components
performing war driving?
Which of the following troubleshooting actions are you most likely to perform first?
endpoints in the intermediate distribution closet?
Which 802.11 standard will work best in this situation?
What feature should you configure?
like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
other types of cabling? (Select two.)
Immunity to electromagnetic interference
traffic that is sent from Host A to Host B.
On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B.
What should you do?
You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.)
nslookup
router back online.
After doing some research you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem.
What should you do next?
However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It’s becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.
What should you do?
reproduce the problem. What should you do next?
discover by others on the same network or system?
Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00d1b6b7c2af dynamic
new switch. The new servers will be used for virtualization.
The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping.
To provide power for the new devices, you will hire an electrician to install several new 20amp wall outlets near the new rack. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server.
Will this configuration work?
network?
Mes
You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
connect their laptops to the Internet through airport and hotel networks.
You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed.
Which solution should you use?
following actions should you take first to protect your network, while still preserving evidence?
You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet.
How can you resolve this problem?
marked with the Expedited Forwarding (EF) precedence value. Which level of quality can you expect from this data stream?
the camera position. Which camera type should you choose?
Which of the following would be the best action to take in order to fix the problem?
Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection.
You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
Verify that your network’s existing security infrastructure is working properly.
2.4GHz cordless phones used in the office are interfering with the wireless network transmissions.
If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)
Bluetooth
Network interface card
devices have Windows RT preinstalled on them.
To increase the security of these devices, you want to apply a default set of securityrelated configuration settings.
What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
Configure and apply security policy settings in a mobile device management system.
building to the Internet is not working properly.
Which of the following allows the service provider to remotely test the local loop?
necessary parameters.
Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect.
What should you do?
As a security administrator, which tasks should you complete during this phase? (Select two.)
Identify how data will be shared.
From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet.
Why can’t you access the server?
connect the branch office network to your home office network.
This morning, users at the branch office reported that they can no longer access resources on the home office network.
You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following:
• Interface status: Up
• Protocol status: Down
What is the most likely cause of this WAN issue?
Which port needs to be enabled to allow secure transactions?
It is a dialup service that uses existing copper wires for the local loop.
It lets you transmit voice, video, and data over the same lines.
Data can be compressed at the source and decompressed at the destination.
LCP provides multilink support.
;; res options: init recurs defnam dnsrch
;;got answer:
;;>>HEADER<
packet delivery?
view and analyze the number of collisions detected on the interface. Which command should you use?
You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?
dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?
attachment that contains malware.
What kind of attack has occurred in this scenario?
attack? (Select two.)
An alert is generated and delivered via email, the console, or an SNMP trap.
Which of the following protocols would be most likely to be allowed through the widest number of firewalls?
What type of connection is being used?
Transport protocol used for other traffic types (such as ATM)
What type of connection is being used?
Uses fixed legnth cells of 53-bytes
TACACS+
Which of the following may be a cause of the connectivity problem?
Switch
find out that all users are having the same problem. What should you do next?
your network. IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.
Which solution should you implement?
physical hardware?
network using the default subnet mask?
between the transmitter and the receiver?
Cache web pages
revealing of a realworld hacker attack?
When you run the software, you only see frames addressed to the four workstations but not to the router.
Which feature should you configure?
would you perform first?
What type of document is this?
connected a cable modem in the business.
The business has four computers that need to communicate with each other and the Internet. The ISP’s cable modem has only one RJ45 port. You need to set up the network with the following in mind:
• Spend as little money as possible.
• Do not purchase unnecessary equipment.
• Computers need to have a gigabit connection to the network. • New devices should not require management or configuration.
You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs.
What should you purchase?
router is configured such that a routing loop exists. What should you do next?
Require identification and name badges for all employees
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables.
Will this implementation work?
network?
you connect her workstation to a switch port.
After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem.
Which of the following is the most likely cause of the problem?
Which type of device should you use to create the DMZ?
the single switch.
In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access.
Which feature should you implement?
192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection:
Connectionspecific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00AABBCC74EF DHCP Enabled . . . . . . . : No
Autoconfiguration Enabled. . . : Yes
IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . : 192.168.2.1
DNS Servers. . . . . . . . . . . : 192.168.2.20
What is the most likely cause of the problem?
connect the branch office network to your home office network.
This morning, users at the branch office reported that they can no longer access resources on the home office network.
You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following:
• Interface status: Up
• Protocol status: Down
What is the most likely cause of this WAN issue?
destination for a group of contiguous subnets?
You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power.
Which cloud service model should you use?
Which of the following commands would be used to configure the router?
to the 802.1w standards. Which protocol should you use?
You now need to apply those security policies to the end users’ mobile devices. What should you do? (Select two. Each response is a part of the complete solution.)
Enroll the devices with the Intune service.
Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection.
You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
Install the latest firmware updates from the device manufacturer.
• Nonoverlapping • Low utilization
• Low interference
You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as show in the exhibit.
Based on the results, which channel should you configure your wireless AP to use?
communications on the network medium?
following utilities would you use? (Select two.)
ifconfig
TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?
One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.)
dig
to accomplish this? (Select two. Each response is a complete solution.)
nslookup 10.0.0.3
Adds labels to data units
following equipment in your building:
• A wireless television distribution system running at 2.4 GHz
• A wireless phone system running at 5.8 GHz
• A wireless phone system running at 900 MHz
• An 802.11a wireless network running in the 5.725 5.850 GHz frequency range • An 802.11j wireless network running in the 4.9 5.0 GHz frequency range
Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
Internet access for patrons.
The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet.
Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored.
What should you do?
requirement for your plan?
connection to a switch?
right.
Scanning for wireless access points = wardriving
Identifying operating system type and version number = banner grabbing
Identifying services that can pass through a firewall = firewalking
(Select two.)
802.11i
*Aug 8 11:18:12.081: %LINEPROTO5UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down
What facility generated this message?
assets. However, there is still some risk left. What is the remaining risk called?
Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection.
You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
Install the latest firmware updates from the device manufacturer.
sharing technology?
devices have Windows RT preinstalled on them.
To increase the security of these devices, you want to apply a default set of securityrelated configuration settings.
What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
Configure and apply security policy settings in a mobile device management system.
• Increase the security of the device.
• Enable remote management from the main office.
• Allow users to be managed through Active Directory.
You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible.
Which of the following tasks should you carry out? (Select two.)
Change the default username and password.
RJ45
the right.
Grey Box Test = The tester has the same amount of information that would be available to a typical insider in the organization.
Black Box Test= The tester has no prior knowledge of the target system.
Single blind test = Either the attacker has prior knowledge about the target system, or the administrator knows that the test is being performed.
Double blind test = The tester does not have prior information about the system and the administrator has no knowledge that the test is being performed.
Step 2 = Deploy a Fibre Channel switch.
Step 3 = Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using.
Step 4 =
Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives.
Which Ethernet standard meets these guidelines? (Choose two.)
10GBaseSR
order in which they should be completed on the right.
Conduct a feasibility analysis
Define the procedure for the implementing the change
Notify affected parties of the pending change
Implement the charge
Test the implementation
Document the change
Hub-and-spoke infrastructure = Lightweight AP
Distributed wireless mesh infrastructure = intelligent AP
security threat exists if this user account is used to perform administrative functions?
To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other.
What should you do? (Select two. Each response is a part of the complete solution.)
Configure all wireless access points with client certificates.
Transmits pulses of radio signals at random amplitudes and frequencies = Random pulse jamming
Repeatedly transmits highintensity, shortduration RF bursts at a rapid pace = Spark Jamming
sharing routes?
Which of the following is an acceptable alternative to Telnet?
like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch.
Will this implementation work?
interconnected using WAN links and routers.
Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office.
To troubleshoot the issue, you have done the following:
• Verified that the server is up and running.
• Verified that the various routers in between the two locations are up and running.
You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 f l 1500 command on your workstation. The ping command returns the following command for each ping packet sent:
“Packet needs to be fragmented but DF set.” What does this mean?
utility company’s transmission lines to 110 volts that can be used by devices in a data center?
right. Each term may be used once, more than once, or not at all.
Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN = LWAPP
Specifies the number of clients that utilize the wireless network. = Device density
Automatically partitions a single broadcast domain into multiple VLANs. = VLAN pooling
Graphically displays wireless signal strength within an area. = heat map
Connects two wired networks together over a WiFi network. = wireless bridge
Identifies how strong a radio signal is at the receiver. = leave blank
The number of useful bits delivered from sender to receiver within a specified amount of time. = goodput
Which document type would you update first in response to this new law?
misleading data that incorrectly maps host names and IP addresses?
You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
What should you use to allow access?
Why cant you access the server?
IS-IS
VLSM
A DHCP server assigns addresses to requesting hosts.
Which device should you use?
Which protocol can you implement on your network to help prevent problems such as this?
169.254.0.0
Use Automatic Private IP Addressing.
Which of the following best describes how addressing is configured for the subnet?
1. 124.77.8.5
2. 131.11.0.9
3. 190.66.250.10
4. 196.5.89.44
Which list represents the IP address class of each listed IP address?
Class B
Class B
Class C
communications?
Which of the following strategies could you try to increase signal strength?
traffic and sort traffic based on protocol. Which tool should you use?
1 = Background
2 = Excellent effort
3 = Critical applications
4 = Video (< 100ms latency) 5 = Voice (< 10ms latency) 6 = internetwork control 7 = network control
Which type of service should you implement?
What type of security weakness does this represent?
Configure the clock rate on the DCE device.
You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed.
When a host tries to connect to the network, the host should be scanned to verify its health. If the host is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the host can then connect to the production network. Which solution should you use?
connector type?
will be required?
examination or to be used as evidence in the event of a security incident.
Which method can you use to ensure that the logs you put in storage have not been altered when you go to use them in the future?
the customer’s responsibility begins for installing and maintaining wiring and equipment?
MAC address that has been learned and allowed by the switch = SecureDynamic
MAC address that is manually configured or dynamically learned that is saved in the config file = SecureSticky
the IP address, subnet mask, and default gateway values. Which device should you use?
Uses fixed-length cells of 53-bytes
Multiple virtual NICs can be added to a virtual machine
Which solution should you use?
new switch. The new servers will be used for virtualization.
The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough plenum UTP cable that will be run through the suspended tile ceiling of the data center.
To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. The only power available in the data center is located on the wall opposite the new server rack, so you must run extension cords across the floor to plug in the UPS unit.
There are problems with this plan. What should you do?
reverting a system back to the state it was in before a change was made?
term may be used more than once; not all descriptions have a matching term.
Checks channel utilization and identifies sources of RF inference. = Spectrum analysis
Identifies how strong a radio signal is at the receiver. = Recieved Signal Level
Identifies the number of useful bits delivered from the sender to the receiver. = (leave blank)
Causes multiple copies of the same radio signal to be received by the receiving antenna. = Bounce
Degrades wireless network performance. = Device satuaration
addressing.
You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem.
Which of the configuration values would you most likely need to change?
problem and is released on a shortterm, periodic basis (typically monthly)?
Handles requests from the Internet to a server in a private network.
specific application running on a device. Which tool should you use?
a router:
FastEthernet0/0 is up, line protocol is up […]
Autoduplex, 100Mb/s, 100BaseTX/FX […]
Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 […]
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
15387 packets input, 1736263 bytes, 0 no buffer
Received 15241 broadcasts, 0 runts, 0 giants
0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast
0 input packets with dribble condition detected
607 packets output, 6141 bytes, 0 underruns
4 output errors, 10 collisions, 3 interface resets, 0 restarts 0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Which of the following statements are true about the fa0/0 interface? (Select three.)
The interface has been dropping incoming packets.
One cyclic redundancy check error has occurred.
sending host and decapsulated on the receiving host using the OSI model.
Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.)
Transport Layer = Segments
Network Layer = Packets
Data Link Layer = Frames
Physical Layer = Bits
this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)
The rear of your servers should face the hot aisle.
Which tool should you use?
View Image
You have two switches connected as shown in the exhibit.
You would like to configure rapid spanning tree on switch A. On which ports would you use the
portfast command?
Double-entry door
an address you can assign to a node on your network?
192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not with other
hosts. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00AABBCC74EF DHCP Enabled . . . . . . . : No
Autoconfiguration Enabled. . . : Yes
IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . : 192.168.2.1
DNS Servers. . . . . . . . . . . : 192.168.2.20
What is the most likely cause of the problem?
ceiling.
A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7.
What term describes this condition?
Tunnel endpoints configured on hosts
Dual stack hosts
You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down.
Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit.
What should you do? (Choose two. Each response is a complete solution.)
Remove the patch cable connecting the first switch to the third switch
Which of the following network topologies should you implement?
What else should you do to protect your systems from malware? (Select two.)
without authorization.
What should you do? (Select two. Each response is a complete solution.)
Check the MAC addresses of devices connected to your wired switch.
that this only seems to happen when the elevator is running. What should you do?
• S0/1/0 is a WAN interface that is connected to an ISP.
• F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. • F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24.
You have configured an access control list on this router using the following rules:
• deny ip 192.168.1.0 0.0.0.255 any • deny ip 192.168.2.0 0.0.0.255 any
These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks.
However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface.
What should you do?
Which standard and cable type would you choose? (Select two.)
1000BaseLX
T568A standard?
Shoulder surfing
Considering the availability of your website, which component represents a single point of failure?
Given this output, which of the following statements is true?
Monitors data dropped on the link and avoids frame looping
Provides load balancing across multiple links
Users cannot select some address prefixes to be imported into OSPF for IPv6; either all address prefixes on an interface are imported, or no address prefixes on an interface are imported.
Provides summary information for each area: Type 3
Created for each router in the area: Type 1
Lists routers that are joined together by the segment: Type 2
Created for each segment on which a DR/BDR has been elected: Type 2
Generates a default external route into an OSPF routing domain: default-information orginate
Displays the current contents of the IPv6 routing table: show ipv6 route
Enables OSPFv3 for IPv6 on an interface: ipv6 ospf [process id] area [number]
Displays OSPFv3 adjacency events: debug ipv6 ospf adj
Weather interference
Weather interference
Two B channels operating at 64 Kbps each.
It is a dial-up service that uses existing copper wires for the local loop.
It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines.
ISDN
MPLS-enabled routers switch packets based on the label information, not on the packet contents.
CEF is required for all MPLS-enabled Cisco routers.
Supports both data and voice at the same time.
Additional HSRP member routers transition from the listen state after the holdtime expires on the hello message.
Additional HSRP member routers transition from the listen state.
A standby router will become the active router should the existing active router fail.
A master router forwards traffic destined to the virtual IP address.
The router with the second highest priority becomes the standby router.
A GLBP group can have up to four member routers acting as IP default gateways.
If the interface goes down, the priority of the HSRP group is reduced to allow the HSRP standby router to become the active router.
Which of the following is true? (Select two.)
The virtual IP address is 172.16.0.1
The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address.
What should be your first step in troubleshooting the problem?
You ping the remote router but that fails as well. At which OSI model layer does the problem originate?
What is the most likely cause of the problem?
What is the cause of the problem?
What should you do?
Router(config)#access-list 101 deny tcp 10.1.0.0 0.0.255.255 any
Which three of the following are identified by the various parts of this command?
It will deny only TCP traffic.
Is applies to traffic originating from all hosts on network 10.1.0.0
Router(config)#access-list 122 permit tcp 10.6.0.0 0.0.0.255 any
Router(config)#int eth 0
Router(config-if)#ip access-group 122 out
From which three of the following addresses will TCP traffic be forwarded out the eth 0 interface?
10.6.0.224
10.6.0.11
access-list 101 permit ip any any
Hosts should be able to contact other hosts using names such as server1.westsim.com.
IP address assignment should be centrally managed.
Which services should you implement on your network to meet the requirements? (Select two.)
DHCP
Srv1 is located on SubnetA. You want to make sure that this server is assigned the same IP address every time it boots, but you still want to centrally manage the address that it uses. What should you do?
254 host addresses are available.
certain websites.
Which benefits are the result of implementing this technology in your organization? (Choose two.)
An increase in bandwidth availability
network using the default subnet mask?
• All ARP requests and responses are intercepted.
• Each intercepted request is verified to ensure that it has a valid IPtoMAC address binding. • If the packet has a valid binding, the switch forwards the packet to the appropriate destination.
• If the packet has an invalid binding, the switch drops the ARP packet.
What security feature was enabled on the switch to accomplish this?
to use for training sessions.
You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible.
Which actions should you take? (Select two. Each response is a separate solution.)
Implement storage segmentation
for fiber optic networking?
• Wireless data within Building 1 should be protected with the highest degree of security.
• Wireless data within Building 2 should be accessible and permitted by any wireless client.
• Wireless signals between Buildings 1 and 2 should be protected with the highest degree of security.
• Wireless signals within Buildings 1 and 2 should cover the whole structure, but not extend to the outside.
For each location on the image below, you need to select the following:
• Antenna option • Security option
Tip: Drag the items from the list on the left to the location identifier on the right. Items may be used more than once. Not all items will be used.
Building 1 Location B – Omni Directional Antenna WPA2 with CCMP
Building 1 Location C – Left-facing Directional Antenna WPA2 with CCMP
Building 1 Location D – Right-facing Parabolic Antenna WPA2 with CCMP
Building 2 Location A – Omni Directional Antenna WEP with Open authentication
Building 2 Location B – Left-facing Parabolic Antenna WPA2 with CCMP
Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?
Which type of device should you use to create the DMZ?
What should you do first?
Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
untrusted network?
WEP
Why can’t you access the server?
What should you do?
Which commands could you use? (Choose two. Each response is a complete solution.)
show interfaces gi0/1 status
prefixing packets with a header containing one or more labels?
What is the most important consideration for getting reliable results when implementing this type of system?
The partnership has been in the ongoing operations phase for almost nine months now. As a security administrator, which tasks should you complete during this phase? (Select two.)
Verify compliance with the IA documents
What would you use to connect the wiring closets together?
A user reports that she can’t access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the Internet.
Which of the following is most likely the cause of the problem?
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch.
Will this implementation work?
Discovering unadvertised servers.
protocol should you use?
department.
Which of the following technologies should you use to logically isolate the network?
device?
the MAC address of the attacker’s computer.
What should you add to your security measures to help prevent this from happening again?
Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?
connect the branch office network to your home office network.
This morning, users at the branch office reported that they can no longer access resources on the home office network.
You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following:
• Interface status: Up
• Protocol status: Down
What is the most likely cause of this WAN issue?
switch. The switch only has 100BaseTX switch ports. Which device should you use?
a router:
FastEthernet0/0 is up, line protocol is up […]
Autoduplex, 100Mb/s, 100BaseTX/FX […]
Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 […]
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
15387 packets input, 1736263 bytes, 0 no buffer
Received 15241 broadcasts, 0 runts, 0 giants
0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast
0 input packets with dribble condition detected
607 packets output, 6141 bytes, 0 underruns
4 output errors, 10 collisions, 3 interface resets, 0 restarts
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Which of the following statements are true about the fa0/0 interface? (Select three.)
The interface has been dropping incoming packets.
One cyclic redundancy check error has occurred.
document should you check?
5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms
6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms 38.050 ms
7 oc486yy.Seat.someisp.net (14.248.154.129) 57.440 ms 56.678 ms 57.675 ms
8 t223hghytry.swa.someisp.net (142.133.89.232) 103.041 ms 57.181 ms 56.619 ms
9 t8343mmd.cgssel.someisp.net (162.191.10261) 91.977 ms 93.971 ms 93.767 ms
10 twirem2.cgssfdl.ip.someisp.net (145.97.133.23) 92.463 ms 92.337 ms 93.523 ms
11 twerrm1.nfffsiny.ip.someisp.net (117.116.141.38) 106.000 ms 106.007 ms 105.283 ms
12 gbed22repp0.n5ddsdsy.ip.someisp.net (123.194.132.8) 103.198 ms 105.447 ms 104.263 ms
Which of the following utilities were you using?
Which options will you be able to set on your firewall? (Select all that apply.)
Source address of a packet
Destination address of a packet
the signal to the next device?
You move the cable router a distance of 50 meters using RG8 cables and special connector adapters.
Which condition are you most likely to experience?
against your network but which have been successfully blocked. Which log would you check?
(i.e. zoom in or out)?
as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?
new switch. The new servers will be used for virtualization.
The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping.
To provide power for the new devices, you will hire an electrician to install several new 20amp wall outlets near the new rack. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server.
Will this configuration work?
Which solution should you implement?
the switch.
You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download.
Which of the following components will be part of your solution? (Select two.)
Remediation servers
when working with computer components?
wireless network name?
B – DB-9
C – RJ 45
D – RJ 11
E – LC
F – BNC
G – F-type
speed?
you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?
Circuit-level Proxy = OSI Layer 5
Application-level Gateway = OSI Layer 7
Routed Firewall = OSI Layer 3
Transparent Firewall = OSI Layer 2
Which of the following recommendations should you follow when applying the hotfix?
Classification occurs at Layer 3.
frames?
ceiling.
A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7.
What term describes this condition?
connect the branch office network to your home office network.
This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following:
• Interface status: Down • Protocol status: Down
What are the most likely causes of this WAN issue? (Select two.)
There is a problem with the service provider’s network.
definition and engine files, and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two.)
Educate users about malware
Implement storage segmentation
Verify that your network’s existing security infrastructure is working properly.
NAS
Which of the following will help reduce the effects of a broadcast storm?
To identify the coverage area and preferred placement of access points.
2. GPOs linked to the domain that contains the user or computer object.
3. GPOs linked to the organizational unit that contains the object.
Adds labels to data units.
which feature prevents switching loops and ensures there is only a single active path between two switches
Need essay sample on "Testout Network + Practice Exam"? We will write a custom essay sample specifically for you for only $ 13.90/page
Can’t wait to take that assignment burden offyour shoulders?
Emily from Businessays
Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy