Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?
Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?
Which of the following is the MOST likely the problem?
A network administrator added a new workstation using CAT6 UTP cable to a new area of the
office. The cable was run across the ceiling tiles to the new workstation. The workstation is 50
meters (164 feet) from the switch and is having problems connecting to the network. Which of the
following is the MOST likely the problem?
Which of the following tools would be needed to accomplish this?
Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).
Which of the following is the BEST method to accomplish this?
An administrator setup a firewall to secure the network and only allow traffic that originated from
the internal network to return; no traffic originating from the outside is allowed to enter. A new
email server needs to be added to the network that will allow traffic to originate from the outside to
access the server. Which of the following is the BEST method to accomplish this?
Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?
Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?
Which of the following is MOST likely the problem?
A technician is troubleshooting a replacement switch that is connected directly to another switch
via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely
the problem?
Which of the following should he do NEXT?
Jeff, a technician, has identified a problem, established and confirmed a theory, and has attempted to resolve the problem. Jeff, however, does not appear to have the rights to make the needed changes. Which of the following should he do NEXT?
Which of the following protocols is generating this traffic?
A network administrator is monitoring switches on a network. Which of the following protocols is
generating this traffic?
which of the following is the MOST important concern for this company?
A new business web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?
Which of the following allows access to a network, based on the hardware address of a network card?
Which of the following allows access to a network, based on the hardware address of a network
card?