Which of the following topologies is represented in this design?
An administrator has added four switches to a campus network. The switch in wiring closet A is
only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the
switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected
to the switch in wiring closet B. Which of the following topologies is represented in this design?
Which of the following can the administrator use to point out the phone system vulnerability?
A company wants an administrator to perform a vulnerability test. The administrator finds the
company has a POTS phone system. Which of the following can the administrator use to point out
the phone system vulnerability?
Which of the following is used to explain guidelines for users while using network resources?
Which of the following is used to explain guidelines for users while using network resources?
which of the following OSI model layers?
Standards such as JPEG and ASCII operate at which of the following OSI model layers?
Which of the following cable types is employed to protect against interference in the physical environment or
Which of the following cable types is employed to protect against interference in the physical
environment or when security is a concern?
Which of the following is true of a client/server topology?
Which of the following is true of a client/server topology?
Which of the following protocols are used to view and send mail from a local host off of a remote server?
Which of the following protocols are used to view and send mail from a local host off of a remote
server? (Select TWO).
Which of the following is a common connector used on a coaxial cable?
Which of the following is a common connector used on a coaxial cable?
Which of the following commands would be used to identify how many hops a data packet makes before reaching it
Which of the following commands would be used to identify how many hops a data packet makes
before reaching its final destination?
Which of the following technologies would BEST accomplish this?
A company has asked the network administrator to restrict access to any websites with
unauthorized material. Which of the following technologies would BEST accomplish this?