A server keeps rebooting at various times throughout the day. Which of...
An administrator finds a phone line but does not know where the line...
An administrator is deploying three B/G wireless access points in a...
Which of the following tools would a technician use to check...
Several users from the same location are reporting problems accessing...
A network IPS provides which of the following?
Which of the following should be configured to provide priority to...
On which of the following network devices would an administrator...
An administrator is trying to isolate the location of a persistent...
Which of the following allows a technician to mask a private network...
A standard installation for wireless will use which of the following...
Which of the following protocols is the LEAST secure and should be...
Which of the following regulates the amount of network traffic a...
A network administrator needs to add an additional connection to a...
Which of the following solutions will detect and disable a rogue...
Which of the following cables is the MOST susceptible to interference?
When installing a wireless network in a large area, which of the...
Which of the following cable speeds would provide the GREATEST...
An administrator is setting up a security camera that will send the...
A user receives an email slating that their account was compromised...
A technician would like to separate the HR department's...
A crossover cable is MOST commonly associated with which of the...
Which of the following documents should always be kept up-to-date...
Which of the following connector types is used for coax cable?
An administrator would like to know the name of the workstation that...
Which of the following technologies allows an administrator to submit...
A technician claims to have crimped a patch cable according to the...
Which of the following is a reason to block FTP at the corporate...
Which of the following methods can move files in clear text and can be...
An administrator receives reports from users in an office that their...
Which of the following protocols should be used to monitor network...
An administrator is concerned about users utilizing the company's...
Prioritizing traffic between data and voice is defined as which of the...
Which of the following allows a WAP to be installed in a location...
Which of the following is true about an IP address if the first bit is...
An administrator receives a contract for a server install at a new...
An administrator is configuring IP 10.178.1.5 on a legacy device that...
An administrator has completed the installation of a new WLAN. Which...
A technician needs to add network capacity. However, when plugging a...
In an enterprise setting, access switches providing network...
Which of the following is the term used to describe the aggregation of...
A demarcation point is usually installed and managed by which of the...
Users are unable to access the Internet but the users are able to...
Which of the following would need to be implemented on a wireless...
After testing a new 100BaseTX cable, the technician determines that...
Which of the following devices would allow a technician using a packet...
Hardware locks, keypads on entry doors, badge readers, and biometric...
Which of the following is equipment provided by the telephone company...
An administrator is troubleshooting a communication issue between two...
Which of the following would be used to connect two IDFs in the same...
Which of the following network devices would MOST likely be installed...
An administrator needs to diagnose problems with a WINS server. Which...
Which of the following wireless standards has the highest maximum data...
Which of the following troubleshooting steps should be performed NEXT...
Which of the following tools are BEST used to cut away the outside...
Which of the following is an invalid subnet mask?
Which of the following routing protocols runs over UDP and determines...
An administrator needs to authenticate users to the network, authorize...
Which of the following wiring distribution components should be chosen...
Which of the following ports is the default telnet port?
Which of the following network topologies BEST describes a VPN?...
A zone transfer occurs over which of the following ports?
Which of the following connectivity issues is likely to occur within a...
Which of the following devices would MOST likely integrate a DHCP...
Which of the following is a disadvantage of using the EIGRP protocol?
Which of the following protocols requests membership to a multicast...
Which of the following tools would an administrator BEST use to trace...
Which of the following is the purpose of QoS?
Which of the following ports are used by default for web servers?...
A client wants to improve the wireless coverage on the third floor of...
Which of the following has a MAXIMUM distance of 300 meters (984...
An administrator wants to prevent users from plugging in their...
Which of the following analyzes the entire subnet to identify all...
The helpdesk is receiving calls about the corporate web server being...
Which of the following describes what the number two represents in...
Which of the following devices is used to connect multiple devices to...
Which of the following is a secure method of copying information over...
Which of the following is used to serve as an emergency backup line to...
A technician who separated two departments using VLANs now discovers...
Which of the following authenticates a web server to the remote client...
Which of the following is true of an ACL when a packet matching an ACE...
Which of the following technologies is used on the backbone of an...
A technician needs to troubleshoot connectivity between two devices...
Which of the following protocols allow the set up, teardown and...
An administrator suspects that an incorrect POTS line is carrying the...
An administrator wants to test the network MTU. Which of the following...
A user is attempting to connect to the network remotely using a laptop...
An administrator is having a hard time adding a new switch to the...
Which of the following protocols uses UDP to transfer files?
Which of the following LAN technology has a MAXIMUM range of 10,000...
Which of the following is true of stateless inspection?
Which of the following utilities would be used to display a...
Which of the following is typically used In an LAN environment?
A user connecting a laptop to a wall jack is prompted for user...
Which of the following routing protocols involves all routers knowing...
When testing a CAT5 cable, the technician notices that pin A is open....
Which of the following performs posture assessments for unknown...
At which of the following OSI model layers is HTTPS encryption...
Which of the following network cable types requires grounding?
Which of the following routing protocols are unable to advertise CIDR...