Which of the following is MOST important to consider when recommending the new hardware?
A technician is asked to recommend new hardware for a company that runs their own
customized database software. Which of the following is MOST important to consider when
recommending the new hardware?
Which of the following is the BEST way to accomplish this?
An administrator needs to obtain the MAC address of all systems on a small SOHO network.
Which of the following is the BEST way to accomplish this?
Which of the following is the MOST likely cause?
A technician installing a new switch notices that users on the switch can communicate with
other devices on the network, but not with the Internet. Which of the following is the MOST
likely cause?
Which of the following is an example of CIDR notation?
Which of the following is an example of CIDR notation?
Which of the following tools would the technician use to finish the installation?
A technician has just finished running a new CAT6 cable and needs to connect the end of
the cable to the wall outlet. Which of the following tools would the technician use to finish the
installation?
Which of the following should be used to extend the range of a network between two points where physical media
Which of the following should be used to extend the range of a network between two points
where physical media cannot be installed?
which of the following network management techniques?
Installing specialized devices in between network resources and the Internet to distribute
network requests and ensure availability of resources is an example of which of the following
network management techniques?
Which of the following is the loopback address for IPv6?
Which of the following is the loopback address for IPv6?
Which of the following tools should the administrator use?
An administrator needs to cut a 100 pair wire in half. Which of the following tools should the
administrator use?
Which of the following attack techniques involves using a WAP with the same SSID to trick users into revealing
Which of the following attack techniques involves using a WAP with the same SSID to trick
users into revealing usernames and passwords?