30 truly interactive simulations — animated firewall, Wireshark hex pane, working Cisco IOS terminal, VLAN port painter, drag-build topology, subnet visualizer.
10.10.1.5) in the DMZ. As the network admin, you have been asked to harden the perimeter firewall before the launch. The compliance team requires a least-privilege ruleset: only the traffic actually needed should reach the DMZ, and management access (SSH) must be restricted to a single bastion host (10.0.0.50). Telnet is forbidden by policy. The firewall implements an implicit deny-all as the final rule. The vendor evaluates the ACL top-down, first match wins.10.0.0.50R1, enable secret set, interface g0/0 with IP 192.168.10.1 255.255.255.0, status up/up, config saved with copy run start.ISP ↔ Firewall ↔ Router ↔ Switch; the Switch branches out to the AP and both PCs.dig queries against your records and report PASS / FAIL per requirement.203.0.113.10, IPv6 2001:db8:42::10. Proxied through Cloudflare (orange cloud) so the origin IP is hidden.www.acme.com. Proxied.mail.acme.com, priority 10; backup MX mail2.acme.com priority 20.v=spf1 include:_spf.google.com ~allv=DMARC1; p=quarantine; rua=mailto:dmarc@acme.com0 issue "letsencrypt.org")ada.ns.cloudflare.com, elliot.ns.cloudflare.com · 2/6 required records presentClick "Save & Run dig" to test your records against an upstream resolver.
us-east-1 inside vpc-0deadbeef. You are the cloud admin. The web-tier-sg attached to the public-facing EC2 ALB targets currently has no inbound rules — users can't reach the site. Configure the SG so:
0.0.0.0/0 + IPv6 ::/010.0.0.50/3210.0.20.0/24 only0.0.0.0/0 for package mirrors| Type | Protocol | Port range | Source | Description |
|---|
| Type | Protocol | Port range | Destination | Description |
|---|
sw-edge-1. Add the 3 required entries.tcp_dst=443 → output:2arp → floodany → controller (table-miss)| Pri | Match | Action | Counters |
|---|
config-if mode for Gi0/5 and apply: switchport mode access, switchport port-security, switchport port-security maximum 1, switchport port-security mac-address sticky, switchport port-security violation restrict, then enable 802.1X (aaa new-model, aaa authentication dot1x default group radius, dot1x system-auth-control, radius-server host 10.0.0.10 auth-port 1812 key ExamSecret!, then on the interface dot1x port-control auto). Save with copy run start. Use the Test buttons to simulate plug-in events — the LED updates live.! empty — nothing applied
192.168.1.0/24 with the router as .1; static device assignments take .2–.99; DHCP clients get .100–.199. The 5 GHz radio broadcasts SSID BranchOffice protected with WPA3-Personal; passphrase WelcomeAcme2026!. Three test clients are waiting in the lobby: a corporate laptop, a guest phone, and a printer at static .50. Apply your changes and they'll attempt to associate live in the right-hand status panel.Router state : Not yet committed WAN status : - LAN IP : - SSID broadcast : - DHCP leases : 0 Last reboot : -
ping, tracert, nslookup, ipconfig, arp -a, netstat -an, route print.ip a, ip route, ss -tlnp, dig, tcpdump, nmap, curl.| System | Account | Source IP | Status | Method | Count | Flag |
|---|---|---|---|---|---|---|
| Gold | administrator | 10.2.1.2 | Failure | Local | 1 | |
| Bronze | andrew | 10.11.12.13 | Success | Local | 1 | |
| Silver | paul | 10.2.2.3 | Failure | SSH | 893 | |
| Gold | andrew | 10.11.12.13 | Success | Local | 1 | |
| Lead | paul | 10.2.2.3 | Failure | SSH | 780 | |
| Antimony | paul | 10.2.2.3 | Failure | SSH | 230 | |
| Gold | bob | 10.11.12.12 | Success | SSH | 1 | |
| Antimony | paul | 10.2.2.3 | Success | SSH | 1 |
| # | Time | Src | Dst | Proto | Info |
|---|---|---|---|---|---|
| 1 | 0.000 | 0.0.0.0:68 | 255.255.255.255:67 | DHCP | Discover - XID 0x3d1f |
| 2 | 0.012 | 192.168.1.1:67 | 255.255.255.255:68 | DHCP | Offer - 192.168.1.150 / lease 86400s |
| 3 | 0.018 | 0.0.0.0:68 | 255.255.255.255:67 | DHCP | Request - Requested IP 192.168.1.150 |
| 4 | 0.024 | 192.168.1.1:67 | 255.255.255.255:68 | DHCP | ACK - Bound 192.168.1.150 GW 192.168.1.1 DNS 1.1.1.1 |
After experiencing attacks on its servers, Company A hired a cybersecurity analyst to configure a DMZ and increase security measures.
Shortly after the network was reconfigured, an assistant on the 2nd floor reported that one of the executives could not access the Internet (specifically https://comptia.org).
However, he said they CAN send internal email, use the intranet, and print on the local printer.
ipconfig and a ping 8.8.8.8 attempt. Identify which one is broken.ping 8.8.8.8 — if your fix works, the ping succeeds.Only make the change needed to fix the connectivity. Do not weaken DMZ protection.
| Subnet | Network | Prefix |
|---|---|---|
| HQ LAN (100 hosts) | 192.168.10.0/? | |
| Branch LAN (50 hosts) | 192.168.10.128/? | |
| WAN P2P (2 hosts) | 192.168.10.192/? |