Which of the following network appliances would facilitate an even...
Sandy, the network technician, needs to run a cable through a power...
Sandy, a technician, is fixing a wireless network that was receiving...
Which of the following ports should be allowed through a firewall to...
A packet sniffer is MOST likely used to do which of the following?
In which of the following wireless standards is MIMO used?
Joe, the network technician, is configuring the channels being used...
Which of the following would Joe, a technician, configure to modify...
Which of the following ports carries IMAP traffic, by default, on...
Which of the following technologies would Sandy, a technician, use to...
Which of the following network access methods is the MOST secure?
Which of the following is the third layer of the OSI model?
Which of the following network topologies, when a single machine's...
Which of the following is a form of encrypting packets for safe,...
Karen, a network technician, wants to use a packet analyzer to...
Joe, a network technician, blocks access to ports 25,110, and 143 on...
A firewall that operates at Layer 7 of the OSI model is known as a(n):
Sandy, a technician, wants to limit access to a wireless network to...
Joe, a client, has observed non-employees sitting in his parking lot...
Kurt, a technician, wants to prevent users from visiting social...
Sandy, a technician, installs a new WAP and users are able to connect;...
A switch in IDF 3 has shut down at 3 p.m. every day this week. Which...
Which of the following has a DB-9 connector?
Sandy, an administrator, has been tasked with running cables from one...
Sandy, a technician, is asked to not allow FTP traffic on a network....
Which of the following could Karen, a network technician, use to find...
Karen, an administrator, has created a patch cable. Which of the...
Which of the following cable mediums is NOT susceptible to EMI?
Which of the following would Karen, a technician, do to monitor remote...
Which of the following is an example of a DHCP failover mechanism?
Which of the following security threats relies primarily on user...
Karen, an administrator, wants to verify which protocols are in use on...
Which of the following TCP/IP and OSI model layers retransmits a TCP...
Which of the following can Joe, a technician, modify on an 802.11n...
Which of the following protocols would Kurt, a technician, use to...
The location that the local network connection ends and the ISP...
Which of the following would be an IP address received from APIPA?
Sandy, the network administrator, has funding to do a major upgrade of...
Joe, a network technician, is tasked with installing a router and...
Sandy, a network administrator, needs to allow all websites to be...
Which of the following technologies would adhere to the AAA model...
VoIP is being implemented throughout a company and Joe, the network...
Joe, a user, is unable to reach websites, but is able to ping several...
Joe, a network administrator, would like to ensure that the footprint...
Which of the following is the MOST economical way for Sandy, a...
T568B wiring scheme is typically found on which of the following...
Kurt, a customer, has been using a combination of SSID disable and WEP...
Joe, a technician, is setting up an IDS security device. Which of the...
CAT6 Ethernet cabling has a rated maximum transmission capability of:
Sandy, an administrator, needs to install a wireless network that will...
Kurt, an administrator, configures a device that functions at the...
Karen, a network technician, is troubleshooting in a wiring closet in...
Which of the following connector types would Sandy, a network...
Two duplicate pieces of equipment can be used in conjunction for which...
Joe, a user, reports that his PC is the only one that does not have...
Joe, a technician, is configuring ports on a switch. He turns off...
Kurt, a network administrator, is responding to a support ticket. The...
Joe, an end user, has plugged in both ends of the same network cable...
Which of the following uses eight groups of characters for addressing?
Sandy, a technician, is reporting wireless transmission speeds of...
For which of the following reasons could a single server's NIC...
Sandy, an administrator, believes that the network has been attacked...
Which of the following network devices MOST likely functions as a...
Which of the following wireless standards operates on the same...
Joe, a customer, shares a building with several other tenants. He...
Which of the following allows for multiple backend web servers to be...
Which of the following utilities would Karen, a technician, use to...
Which of the following can Joe, a network technician, change to help...
A company has only three laptops that connect to their wireless...
Which of the following defines the range of IP addresses a DHCP server...
Which of the following OSI model layers is used for logical...
Which of the following cable types would have the LEAST amount of EMI?
Sandy, a network administrator, wants to be able to block all already...
Once Kurt, a technician, has implemented the solution to a user's...
Which of the following issues is a common problem in wireless...
A new business' web server has seen a huge spike of legitimate...
Kurt, a network technician, is setting up a router and wants to ensure...
Which of the following is an example of two-factor authentication?
Users are unable to access the company's intranet website. Which of...
Which of the following sizes is the fixed cell length in ATM?
Which of the following network scanners detects and sends out alerts...
The ISP needs to terminate the WAN connection. The connection should...
Which of the following tools would Kurt, an administrator, use to...
DNS lookups for a given host are intermittently failing. Which of the...
Karen, a network technician, needs to identify the MAC address of a...
Karen, a technician, needs to test if domain name resolution is...
A small office has asked to have six PCs networked together by Joe. a...
Which of the following VPN methods is BEST used for connecting a...
Kurt, an administrator, wants to eliminate remote access to a network...
Kurt, a technician, spoke to a user regarding a network problem. He...
Which of the following services would Karen, a technician, use to...
Which of the following provides Kurt, a network technician, resource...
Which of the following services do TCP connections provide to...
Which of the following exterior routing protocols uses an algorithm to...
After installing new cabling, Karen, a technician, notices that...
Sandy, a technician, is asked to install a wireless router in a...
Which of the following could Karen, a network technician, use to...
Kurt, a network administrator, wants to separate the network into...
Which of the following should Joe, a technician, do FIRST when setting...
Kurt, an administrator, receives reports from users in an office that...