Which of the following MOST likely represents the cause of the issues?
Due to space limitations, LAN cables were installed directly over power lines to certain
offices. The offices have been reporting network connectivity issues. Which of the following
MOST likely represents the cause of the issues?
Which of the following technologies would help centralize 802.1q management?
A company is growing rapidly and is looking for ways to reduce time spent on IT
infrastructure administration. The administrator has decided one way to meet this need will
be to reduce 802.1q management duties. Which of the following technologies would help
centralize 802.1q management?
For the BEST performance, wireless signals should use:
For the BEST performance, wireless signals should use:
Which of the following routing protocols would a technician use if they needed to connect multiple large netwo
Which of the following routing protocols would a technician use if they needed to connect
multiple large networks together where routers advertise all routes to each other?
Which of the following protocols operates locally between a client and a router to negotiate the flow of multi
Which of the following protocols operates locally between a client and a router to negotiate
the flow of multicast traffic?
Which of the following provides the HIGHEST level of network security?
An administrator needs to block a virus infected computer. Which of the following provides
the HIGHEST level of network security?
Which of the following LAN technologies has the GREATEST throughput speed?
Which of the following LAN technologies has the GREATEST throughput speed?
Which of the following networking protocols is often used for booting or loading programs on diskless workstat
Which of the following networking protocols is often used for booting or loading programs on
diskless workstations?
Which of the following can provide clients access to network resources such as a web server as well as providi
Which of the following can provide clients access to network resources such as a web server
as well as providing Internet usage reports?
Which of the following protocols needs to be denied?
A network technician is concerned that an attacker is attempting to penetrate the network,
and wants to set a rule on the firewall to prevent the attacker from learning which IP
addresses are valid on the network. Which of the following protocols needs to be denied?