which of the following commands will give Joe, the technician, a list of the host names connected to the netwo
When troubleshooting a connectivity issue, which of the following commands will give Joe, the
technician, a list of the host names connected to the network?
Which of the following commands would be MOST helpful in determining the MAC address?
When configuring a wireless access point, Kurt, a network administrator, needs to determine the
MAC address of a local printer. Which of the following commands would be MOST helpful in
determining the MAC address?
Which of the following utilities should be used to locate the network issue?
Sandy, a network technician, is troubleshooting connectivity to a server at a remote office. Which of
the following utilities should be used to locate the network issue?
Which of the following tools would BEST be used to verify if a network cable is properly terminated?
Which of the following tools would BEST be used to verify if a network cable is properly terminated?
Which of the following tools should she use?
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?
Which of the following protocols could the below packet capture be from?
Which of the following protocols could the below packet capture be from?
Port: 161
msgVersion: <masked>
msgUsername: <masked>
msgAuthenticationParameters: <masked>
msgPrivacyParameters: <masked>
msgData:
data: get-request
request-id: <masked>
error-status: noError (0)
error-index: 0
variable-bindings: 0 items
Which of the following can be used for two or more networking cards?
A network administrator wants to balance the amount of data between two networking cards.
Which of the following can be used for two or more networking cards?
Which of the following can BEST provide this functionality?
An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to
particular users at a company. Which of the following can BEST provide this functionality?
Which of the following should be implemented to ensure both sites are accessible?
A company has been just opened a new site in another country. Both sites share information across
the WAN continuously throughout the business day. Which of the following should be implemented
to ensure both sites are accessible?
Which of the following protocols can be used?
A technician wants to send management information from devices on the network to a central
server and have it encrypted in the process. Which of the following protocols can be used?