Which of the following is the network topology in which computers...
In the 2.4GHz range, which of the following channel combinations are...
A router that takes the workstations internal IP address and changes...
Which of the following ports is the default telnet port?
Which of the following basic devices blocks ports and can sometimes...
Which of the following is the port number used by HTTP?
Sandy, a network technician, is attempting to map a FQDN to an...
Karen, a network administrator, needs to add an additional connection...
1000BaseT has a MAXIMUM run distance of:
Which of the following protocols is commonly used for VoIP technology?
The location where the Telco wiring stops and the clients wiring...
A layer 3 switch can move packets between subnets based on which of...
Which of the following wireless technologies can support the MOST...
When installing two 802.11g access points in the same building, which...
Which of the following protocols is Joe, a technician, using to...
Which of the following metrics indentifies the number of connections...
Karen, a technician, is asked to run new cabling for an office that is...
Users are unable to stay connected to the company's wireless...
A section of the building has been having intermittent connectivity...
A bridge handles frames at which of the following layers of the OSI...
Which of the following describes the location where an administrator...
A company needs strong wireless security enabled for minimal cost....
Joe, a user, can no longer access the accounting file share, but...
Which of the following regulates the amount of network traffic a...
Which of the following would contain information regarding network...
Which of the following wireless technologies can support the GREATEST...
Which of the following wiring standards would Karen, a technician,...
Which of the following connector types is MOST commonly found with...
Which of the following connector types will MOST likely be located on...
Joe, an administrator, is using a punch-down tool to connect a cable....
Which of the following is a multifunction device in a SOHO network?
A company wants to secure access to its internal wifeless network. The...
Which of the following would Karen, a technician, use in voice over IP...
Which of the following is a performance optimization technology?
Which of the following would help a new administrator quickly...
Keyword and blacklist filtering would be handled at which level in a...
Karen, a network technician, is troubleshooting a problem and has just...
A company plans to implement a wired network between several...
Which of the following is the name of the routing update process...
Which of the following uses a ring topology?
Kurt, a user, on a network cannot access any network resources. The...
Which of the following DNS record types provides the hostname to IP...
Which of the following WAN technologies uses a telephone cable?
A technician receives an urgent call that the switch in accounting is...
By default, which of the following ports would a network need to have...
Which of the following ports would have to be allowed through a...
Which of the following DNS records would be queried to locate a...
Which of the following features should an administrator configure to...
Which of the following improves wireless performance only allowing...
Creating a uniform user environment throughout the network can BEST be...
Users have reported slow access limes when retrieving information from...
Which of the following interfaces is used to connect analog devices to...
Which of the following is an example of a MAC address?
An administrator is setting up a network and would like to prevent...
Joe, an administrator, has just finished installing a new switch and...
Which of the following is used by RADIUS to encrypt messages between...
Which of the following should an administrator do after running a...
Which of the following would provide Kurt, a technician, with a...
Which of the following is MOST commonly powered using PoE?
The selection of the correct punch down tool to use depends on which...
Kurt, an administrator, needs to install a new 100 foot (30 meter)...
A network technician arrives to work and discovers users are having a...
Which of the following virtual components maintains a MAC-to-port...
Which of the following devices should Joe, an administrator, connect...
Which of the following can be an STP cable?
Which of the following utilities would be used to display a NIC's...
Which of the following tools would an administrator use to determine...
An administrator only has one public IP address that must be shared...
Switch A is configured with VLAN 105 and 106. Switch B is configured...
Which of the following is an EGP routing protocol?
Kurt, the network administrator, has just finished installing a new...
Which of the following would be used to test out the security of a...
Which of the following is used to identify active hosts along with...
A web server is running correctly but sending a RST packet to any...
A user reports sporadic connectivity with their wireless connection. A...
At which of the following layers does the TFTP protocol operate?
Before installing a wireless network, which of the following should...
In which of the following layers of the OSI model does the TCP...
After a baseline check was completed it was noted that the network was...
Sandy, a user, is unable to access the company website on a laptop. A...
Which of the following is an intelligent repeater that is aware of the...
Which of the following security devices would MOST likely be used on a...
Which of the following devices transmits timed broadcasts onto an...
Karen, a customer, wants to install a wireless network into a shared...
Which of the following features does SNMPv3 have over previous...
A common technique used to prevent the unauthorized network devices...
Karen, an administrator, wants to list all the network connections to...
A Stateful firewall is MOST useful in protecting against which of the...
Which of the following is most effective against threats when used...
Sandy, an administrator, attempts to open a web page and sees the...
Which of the following are valid MAC addresses? (Select TWO)
Which of the following utilities can be used to list the routing...
At which of the following layers does the ICMP protocol operate?
Which of the following would be BEST to use when identifying HTTP...
Which of the following layers of the OSI model maps to the Network...
For security reasons Kurt, a network technician, wants to install a...
Which of the following is a correct IP ACL? (Select TWO)
A company is about to install a second network connection with a new...
Which of the following are common VPN transports? (Select TWO)
A crossover cable is MOST commonly associated with which of the...