Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
Networking 005 Part 6
100 Questions
|
By SGogola | Updated: Mar 21, 2022
| Attempts: 142
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 100
0 %
0/100
Score
0/100
1.
Which of the following metrics indentifies the number of connections that is between two devices?
Hop count
MTU
Latency
Bandwidth
Submit
Start Quiz
About This Quiz
Networking
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
In which of the following topologies could the failure of one machine cause the entire network to stop functioning?
Mesh
Token ring
Star
Spanning tree
Submit
3.
A natural disaster has occurred and the administrator must return the network to a healthy status. Which of the following should the administrator do in this case?
Follow the emergency action plan.
Wait for an issue to be reported.
Establish a new baseline
Determine if escalation is necessary.
Submit
4.
At which of the following layers does the UDP protocol operate?
Layer 1
Layer4
Layer 6
Layer 7
Submit
5.
Which of the following denotes the FINAL point of responsibility for a service provider?
66 block
Patch panel
Wiring closet
Demarc
Submit
6.
After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?
Signal loss
Signal bleed
Data collision
Crosstalk
Submit
7.
At which of the following does the telephone company's responsibility cease?
66 block
Demarc
110 block
MDF
Submit
8.
An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?
Turn down the transmission strength of the access point.
Replace the antenna with a smaller one.
Change the wireless password to a more complex one.
Change the SSID of the access point
Submit
9.
Which of the following should be used to test an internal NIC without having to connect it to the network?
Loopback cable
Crossover cable
Rollover cable
Straight cable
Submit
10.
Which of the following commands would allow a computer to acquire an IP address?
Ipconfig/release
Ipconfig/renew
Ipconfig/all
Ipconfig/help
Submit
11.
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?
Phishing scam
Social engineering
Man-in-the-Middle
Shoulder surfing
Submit
12.
A small business with eight employees has just opened their office in a renovated loft in a busy downtown area. The owner of the building does not want to run any additional wiring beyond power, to preserve the historic nature of the building. Because of this stipulation, almost all tenants in the building have chosen to implement wireless. Which of the following should be the FIRST step in setting up this SOHO network?
Run a wireless site survey
Speak to tenants to determine their telephone standards.
Install and configure a Gigabit switch.
Determine the operating system versions
Submit
13.
An administrator has found interference on a network. Which of the following cable types is the network MOST likely composed of?
UTP
Fiber
RG-6
STP
Submit
14.
A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type?
Multicast
DHCP
APIPA
Broadcast
Submit
15.
The T568B wiring standard slates that CAT5 cables should be coded as follows:
White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,
White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown
White/Orange, Orange, White/Green, Blue,
Submit
16.
Which of the following layers of the OSI model is the presentation layer?
Layer 1
Layer 5
Layer 6
Layer 7
Submit
17.
Users report an intermittent degradation of sound on their IP phones. Which of the following would a network administrator do to alleviate the problem?
Use plenum cables
Provide fault tolerance for the switch
Configure VLAN trunking on the switch
Configure QoS
Submit
18.
When verifying a new wireless installation the administrator is unable to see a wireless signal with any wireless laptop. The MOST likely problem is:
The SSID is not set to broadcast
An incorrect channel is being used
Incorrect client security settings are configured
Incorrect client configuration on the laptops
Submit
19.
Which of the following network devices would MOST likely be installed on a network to help reduce broadcast traffic and to allow individual virtual networks?
Switch
Repeater
Hub
WAP
Submit
20.
Which of the following connector types is commonly identified by two rows of pins with four in one row and five in the other?
DB-9
RJ-45
SC
BNC
Submit
21.
Which of the following protocols can be used to retrieve system and network performance information from a router?
LDAP
IMAP
TFTP
SNMP
Submit
22.
Which of the following tools can be used to identify the location of a network outage?
Traceroute
Netstat
Nslookup
Ping
Submit
23.
In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?
Incorrect subnet mask
Mismatched MTU
Switching loop
VLAN mismatch
Submit
24.
Which of the following WAN technologies has the GREATEST latency and is not recommended for VoIP?
ISDN
DSL
Satellite
Cable
Submit
25.
Which of the following protocols is commonly used by ping?
SIP
ICMP
TFTP
ARP
Submit
26.
Which of the following wireless standards has a MAXIMUM throughput, by default, of 11Mbps?
802.11g
802.11a
802.1 n
802.11b
Submit
27.
802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of the following?
460 feet (140 meters
540 feet (165 meters)
560 feet (171 meters
840 feet (256 meters
Submit
28.
A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?
The laptop is too far away from the WAP.
The WAP is using 802.11a frequencies
The laptop is only set to allow 802.11n connections
The technician is on an 802.11b network
Submit
29.
How many bits are in an IPv6 address?
32
64
128
256
Submit
30.
Which of the following does not affect security on a wireless access point?
Encryption
DHCP
Password
SSID
Submit
31.
Physical and logical network diagrams are used for which of the following configuration management goals?
Track DHCP distribution
Compare MAC and IP addresses
Document Internet access history
Identity network devices
Submit
32.
Which of the following mitigation techniques would an administrator apply to a device in order to restrict remote access?
Disable TELNET
Disable IGMP snooping
Enable TELNET but not SSL
Disable ICMP/ping on device
Submit
33.
A computer is able to ping other devices on the same network but is unable to ping devices on another network. Which of the following needs to be configured?
DNS primary server
Host route
Proxy ARP
Default gateway
Submit
34.
Which of the following address formats uses 32-bit addressing?
IPv4IPv4
MAC address
IPv6
Host address
Submit
35.
Which of the following WAN protocols is a packet switching technology?
Frame Relay
POTS
PSTN
ISDN
Submit
36.
Which of the following is used to reduce the number of public IP addresses required?
RADIUS
SNAT
PAT
NAT
Submit
37.
A client is having problems connecting remotely after replacing a router. An administrator has just created an action plan. Which of the following is the NEXT step the administrator should perform to resolve this issue?
Implement and test the solution.
Determine if escalation is necessary.
Identify the affected areas of the network.
Identify the results and effects of the solution
Submit
38.
When ordering aT1 line, the network technician tells the telecommunications company that a particular device is not needed since it is built-in to the router's T1 port. Which of the following devices is the technician referring to?
CSU/DSU
ATM
TDR
DWDM
Submit
39.
Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
Reverse ARP
Full duplex on the fiber link
PoE
802.1q trunking
Submit
40.
Which of the following devices can be installed on individual computers throughout the network?
NIPS
Network-based firewall
VPN concentrator
Host-based firewall
Submit
41.
Which of the following has a maximum data rate of 11Mbps?
802.11n
802.11g
802.11b
802.11a
Submit
42.
Which of the following networks are reserved for private IP addresses?
168.129.00/24
172.16.128.0/15
192.168.0.0/16
162.17.0.0/12
Submit
43.
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?
Dig company.com ns
Ipconfig/all
Ifconfig-a
Dig company.com mx
Submit
44.
An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?
Multimeter
Snips
Toner probe
Punch down tool
Submit
45.
Which of the following cable types has a MAXIMUM transmission speed of 10Mbps?
CAT6
CAT5
Single-mode fiber
CAT3
Submit
46.
Which of the following would be used to lock all of the primary communication equipment of a building, including its demarcation point?
MTR
MDF
Smartjack
IDF
Submit
47.
The "1000" in 1000BaseT cabling represents which of the following?
The theoretical maximum cable length
The theoretical maximum bandwidth
The theoretical port limit of the cable
The quality level of the copper wiring used
Submit
48.
A technician temporarily needs an additional network connection in their office to test a new workstation. Which of the following is the BEST solution to add a temporary network connection?
Install a small network switch
Use port mirroring on the switch
Split the pairs of the existing jack
Install a CSU/DSU
Submit
49.
Interior gateway protocols are used for resolving routes:
Between networks
Within routers
Within networks
Between WAPs
Submit
50.
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?
SSH
WEP
VPN
WPA
Submit
51.
For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?
VPN concentrator
Virtual servers
Wireless
Multimode fiber
Submit
52.
A stateless firewall requires a technician to:
Write more packet filters.
Write less packet filters.
Purchase a license for states
Upgrade definitions manually
Submit
53.
Which of the following tools allows an administrator to determine the MAC address of another computer?
Ping
Arp
Ifconfig
Ipconfig
Submit
54.
Which of the following is used to create multiple networks from one large network?
PAT
NAT
Multicast
Subnetting
Submit
55.
Which of the following OSI model layers is used for logical addressing?
Physical
Transport
Network
Data link
Submit
56.
Which of the following is a TRUE statement about static routing vs. dynamic routing?
Dynamic routing is created adhoc and static routing cannot be changed once implemented
Static routing is hard-coded and requires significant administrative overhead for large networks.
Static routing requires little administrative overhead and dynamic routing requires significantadministrative overhead
Dynamic routing is the best solution for small networks and static routing is the best solution forlarge scale networks.
Submit
57.
A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?
DHCP server
Proxy server
Repeater
DHCP relay
Submit
58.
Which of the following services can an administrator use to reduce latency and prioritize the flow of data?
Fault tolerance
RADIUS
Qos
Load balancing
Submit
59.
Which of the following has the HIGHEST data rate speed?
T1
ADSL
SDSL
OC-3
Submit
60.
Two autonomous networks who wish to exchange routing data should use which of the following protocols?
OSPF
BGP
EIGRP
IS-IS
Submit
61.
Which of the following restricts network access to a router administrator's interface?
IDS
SSL
ACL
SMNPv2
Submit
62.
Which of the following is the full range of address block 192.16876.0/23?
192.168.76.0-192.168.77.255
192.168.76.0-192.168.76.255
192.168.76.0-192.168.76.23
192.168.76.0-192.168.78 0
Submit
63.
Which of the following wireless technologies can operate at only 5GHz?
802.11b/g
802.11g
802.11b
802.11a
Submit
64.
Link aggregation is also known as port:
Distribution
Mirroring
Spanning
Trunking
Submit
65.
A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?
Call their local ISP
Verify the IP information of the server
Check their local Internet connection
Verify the hostname of the server
Submit
66.
Which of the following protocols defaults to port 161?
SFTP
SNMP
SMTP
SNTP
Submit
67.
Which of the following technologies was designed to provide the FASTEST data rates over analog phone lines?
RADSL
SONET
ADSL
MPLS
Submit
68.
Kerberos is a form of user authentication that:
Provides users access to network resources
Performs router commands after user authentication.
Provides users with remote access only capabilities
Does not require an authentication server
Submit
69.
Determining when to retransmit frames is an example of which of the following Ethernet properties?
Carrier sense
Collision detection
Multiple access points
Collision avoidance
Submit
70.
A user is trying to connect their new desktop to the network but is unable to get an IP address. The technician tests the cable and finds that there are too many open pairs. Which of the following wiring standards needs to be used in the replacement cable?
568B
Crossover
569-A
607-A
Submit
71.
Which of the following is the MOST secure method to enable remote users to access a company's internal network resources?
VPN concentrator
Network-based firewall
DMZ
Stateful firewall
Submit
72.
A network at a small business utilizes a star topology and is experiencing frequent collisions among data packets. Which of the following devices is MOST likely being used?
Unmanaged switch
Hardware firewall
Hub
Managed switch
Submit
73.
An administrator needs to know the workstation name of a user who called in for support in order to remotely manage it. After calling the user and having the user open a command prompt, which of the following commands would the administrator ask the user to type?
Netstat
Ifconfig
Hostname
Ping
Submit
74.
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?
Baseline configuration
Security policy
Performance and transaction logs
Physical network diagram
Submit
75.
Which of the following routing protocols is strictly a distance vector protocol?
IS-IS
BGP
EIGRP
OSPF
Submit
76.
Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario?
The DHCP server has an incorrect gateway configured
The DHCP server was incorrectly configured with a six hour lease time on addresses
The DHCP server was incorrectly configured with no-expiring lease time on addresses.
The DNS server is no longer functional and internal name-address resolution is down
Submit
77.
Which of the following is the MOST efficient way to troubleshoot network problems?
Create an action plan
Implement and test a solution
Determine if anything has changed
Identity a probable cause
Submit
78.
Using network monitoring tools would allow an administrator to do which of the following?
Configure offline devices
Examine performance issues
Install additional software and updates
View syslog events
Submit
79.
Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?
Proxy
Load balancer
Router
Bandwidth shaper
Submit
80.
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?
The laptop is missing the software supplicant
The access point SSID is hidden.
The laptop only supports TKIP and AES encryption,
The access point is on the wrong channel
Submit
81.
Which of the following commands is used to display other computers running on the network?
Hostname
Ipconfig
Net view
Nslookup
Submit
82.
When debugging a routing problem, the time-to-live (TTL) value can be used to determine:
Number of routes available.
Number of router hops
Time that an advertised route is valid.
Time to make a round trip.
Submit
83.
Users are reporting that they are still experiencing network issues even though a fix was recently applied. Which of the following troubleshooting methodology steps is the administrator using?
Escalating the problem
Testing the solution and identifying the effects
Continuing to gather information about the same symptoms
Documenting the solution and the entire process
Submit
84.
A technician is troubleshooting a network connectivity issue with a user's desktop configured to use a static IP address. The technician notes the following configuration: IP 172.16.2.0 NETMASK 255.255.254.0 DEFAULT GATEWAY 172.16.1.1 DNS 192.168.1.1 Which of the following changes will allow the desktop to communicate properly with remote networks?
Changing the DNS to 172.16.1.100
Changing the WINS server to 172.174.136
Changing the netmask to 255.255.255.0
Changing the default gateway to 1 72.16.3.1
Submit
85.
Which of the following wireless standards was the FIRST standard to be ratified and is used to support legacy wireless devices?
802.11a
802.11g
802.11b
802.11n
Submit
86.
Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?
Multicast
PAT
CIDR
NAT
Submit
87.
A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?
Subnetting
Unicast
Broadcast
Multicast
Submit
88.
An administrator is troubleshooting wireless connectivity issues at a client's office and discovers that the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?
802.1 1g
802.1X
802.11n
802.11b
Submit
89.
Which of the following layers is associated with the physical hardware address of a network node?
Layer 1
Layer 2
Layer 6
Layer 7
Submit
90.
A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement?
Multicast addressing
Load balancing
Address translation
DHCP
Submit
91.
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?
DHCP
PAT
Proxy
IPX
Submit
92.
Which of the following should be changed to secure access to a WAPs configuration management interface?
SSID
WPA2
DHCP
Password
Submit
93.
Which of the following WAN protocols is a circuit switching technology?
ISDN
SONET
Frame Relay
ATM
Submit
94.
Which of the following monitors a server to see which protocols might be in use?
Ping sweep
Intrusion detection software
Port scanner
Wireless packet sniffer
Submit
95.
Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO).
802.11g
802.1X
802.11b
802.1 m
802.11a
Submit
96.
Which of the following is the MOST likely authentication scheme used in 802.1x?
CHAP
RADIUS
TACACS+
Kerberos
Submit
97.
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?
Disable SSID
WPA
MAC filtering
RAS
Submit
98.
Several users are sending emails to CompTIA.org. but they are not being received. Which of the following commands could be used to verify that the company is able to connect to the mail service at CompTIA.org?
Ping
Arp
Dig
Telnet
Submit
99.
Web users are reporting issues downloading various types of media. Which of the following should the administrator do FIRST?
Find out what has recently changed on the network
Create an action plan and solution identifying potential effects.
Continue to gather information and see what other problems may exist.
Determine the most probable cause.
Submit
100.
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?
CSMA/CA
CSMA/CD
Wireless encryption
Wireless bonding
Submit
×
Thank you for your feedback!
View My Results
Related Quizzes
Networking Fundamentals Quiz #1
Networking Fundamentals Quiz #1
Networking 005 Quiz
Networking 005 Quiz
Lesson 6: Working With Networking Services
Lesson 6: Working With Networking Services
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (100)
Unanswered (
)
Answered (
)
Which of the following metrics indentifies the number of connections...
In which of the following topologies could the failure of one machine...
A natural disaster has occurred and the administrator must return the...
At which of the following layers does the UDP protocol operate?
Which of the following denotes the FINAL point of responsibility for a...
After 100 meters (328 feet), CAT6 cabling is known to experience which...
At which of the following does the telephone company's...
An administrator has added a new access point to the network to...
Which of the following should be used to test an internal NIC without...
Which of the following commands would allow a computer to acquire an...
A user receives a call from someone reporting to be from the help desk...
A small business with eight employees has just opened their office in...
An administrator has found interference on a network. Which of the...
A user reports that their laptop does not have network connectivity,...
The T568B wiring standard slates that CAT5 cables should be coded as...
Which of the following layers of the OSI model is the presentation...
Users report an intermittent degradation of sound on their IP phones....
When verifying a new wireless installation the administrator is unable...
Which of the following network devices would MOST likely be installed...
Which of the following connector types is commonly identified by two...
Which of the following protocols can be used to retrieve system and...
Which of the following tools can be used to identify the location of a...
In an environment with STP disabled, which of the following is the...
Which of the following WAN technologies has the GREATEST latency and...
Which of the following protocols is commonly used by ping?
Which of the following wireless standards has a MAXIMUM throughput, by...
802.11g wireless signals operating at 24GHz has a maximum line of...
A technician is working on a SOHO wireless network and notices that...
How many bits are in an IPv6 address?
Which of the following does not affect security on a wireless access...
Physical and logical network diagrams are used for which of the...
Which of the following mitigation techniques would an administrator...
A computer is able to ping other devices on the same network but is...
Which of the following address formats uses 32-bit addressing?
Which of the following WAN protocols is a packet switching technology?
Which of the following is used to reduce the number of public IP...
A client is having problems connecting remotely after replacing a...
When ordering aT1 line, the network technician tells the...
Switch A is configured with VLAN 105 and 106. Switch Bis configured...
Which of the following devices can be installed on individual...
Which of the following has a maximum data rate of 11Mbps?
Which of the following networks are reserved for private IP addresses?
Users are reporting problems connecting to servers in the remote...
An administrator needs to terminate network cables that have just been...
Which of the following cable types has a MAXIMUM transmission speed of...
Which of the following would be used to lock all of the primary...
The "1000" in 1000BaseT cabling represents which of the...
A technician temporarily needs an additional network connection in...
Interior gateway protocols are used for resolving routes:
An administrator is implementing a wireless network. Which of the...
For security reasons a network technician wants to install a Linux...
A stateless firewall requires a technician to:
Which of the following tools allows an administrator to determine the...
Which of the following is used to create multiple networks from one...
Which of the following OSI model layers is used for logical...
Which of the following is a TRUE statement about static routing vs....
A technician wants to use an existing DHCP server for three additional...
Which of the following services can an administrator use to reduce...
Which of the following has the HIGHEST data rate speed?
Two autonomous networks who wish to exchange routing data should use...
Which of the following restricts network access to a router...
Which of the following is the full range of address block...
Which of the following wireless technologies can operate at only 5GHz?
Link aggregation is also known as port:
A VPN connection is not working correctly and the technician is unable...
Which of the following protocols defaults to port 161?
Which of the following technologies was designed to provide the...
Kerberos is a form of user authentication that:
Determining when to retransmit frames is an example of which of the...
A user is trying to connect their new desktop to the network but is...
Which of the following is the MOST secure method to enable remote...
A network at a small business utilizes a star topology and is...
An administrator needs to know the workstation name of a user who...
Multiple users call from the same location saying that they have no...
Which of the following routing protocols is strictly a distance vector...
Computers on a small network are not able to receive new addresses...
Which of the following is the MOST efficient way to troubleshoot...
Using network monitoring tools would allow an administrator to do...
Which of the following devices allows multiple internal IP addresses...
A company finished upgrading the wireless encryption to WPA2...
Which of the following commands is used to display other computers...
When debugging a routing problem, the time-to-live (TTL) value can be...
Users are reporting that they are still experiencing network issues...
A technician is troubleshooting a network connectivity issue with a...
Which of the following wireless standards was the FIRST standard to be...
Two business partners have recently been connected via a dedicated...
A technician at a company providing online, real-time media streaming...
An administrator is troubleshooting wireless connectivity issues at a...
Which of the following layers is associated with the physical hardware...
A small office in which all workstations are using an ISP provided IP...
A technician needs to ensure that a specific application on a single...
Which of the following should be changed to secure access to a WAPs...
Which of the following WAN protocols is a circuit switching...
Which of the following monitors a server to see which protocols might...
Which of the following wireless standards can be used to avoid the...
Which of the following is the MOST likely authentication scheme used...
An administrator wants to limit access of a wireless network without...
Several users are sending emails to CompTIA.org. but they are not...
Web users are reporting issues downloading various types of media....
Which of the following improves wireless performance by allowing only...
X
OK
X
OK
Cancel
X
OK
Cancel
Advertisement