which of the following?
The selection of the correct punch down tool to use depends on which of the following?
Which of the following would Karen, a technician, do to monitor remote traffic through an access point?
Which of the following would Karen, a technician, do to monitor remote traffic through an access
point?
Which of the following could Karen, a network technician, use to find the approximate location of a break in a
Which of the following could Karen, a network technician, use to find the approximate location of a
break in a long network cable?
Which of the following network tools will confirm this analysis?
Sandy, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an
issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this
analysis?
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?
Which of the following describes a rationale for a network with redundant paths?
Which of the following describes a rationale for a network with redundant paths?
Which of the following network devices hides network nodes behind one public IP address?
Which of the following network devices hides network nodes behind one public IP address?
Which of the following practices allows other technicians to quickly return the network to normal speeds?
Sandy, a technician, decides to upgrade a router before leaving for vacation. While away, users begin
to report slow performance. Which of the following practices allows other technicians to quickly
return the network to normal speeds?
Which of the following is the BEST recommendation?
Management has decided that they want a high level of security. They do not want Internet requests
coming directly from users. Which of the following is the BEST recommendation?
Which of the following would BEST help Karen?
Karen, a technician, suspects a virus has infected the network and is using up bandwidth. She needs
to quickly determine which workstation is infected with the virus. Which of the following would BEST
help Karen?