Which of the following wireless technologies uses point-to-multipoint for data transmission?
Which of the following wireless technologies uses point-to-multipoint for data transmission?
Which of the following BEST describes the purpose of DHCP?
Which of the following BEST describes the purpose of DHCP?
Which of the following naming conventions takes place in the data link layer of the OSI model and is often use
Which of the following naming conventions takes place in the data link layer of the OSI
model and is often used in conjunction with IPv6?
Which of the following tools would verify this?
An administrator needs to determine if the local workstation is using DHCP. Which of the
following tools would verify this?
Which of the following cable types is LEAST susceptible to EMI by definition?
Which of the following cable types is LEAST susceptible to EMI by definition?
Which of the following addressing mechanisms should the technician use to provide access and IP addresses for
A technician is setting up a network for 25 users at a remote location. All of the users share
a single Internet connection. The ISP provides a single IP address for the location. Which of
the following addressing mechanisms should the technician use to provide access and IP
addresses for all 25 users?
Which of the following tools would a technician use to attach a new connector to eliminate this issue?
A technician has noticed that the RJ-45 connector on the end of a users patch cable was
stripped too far back from the connector allowing for cross talk. Which of the following tools
would a technician use to attach a new connector to eliminate this issue?
Which of the following is MOST likely to be used for telephone wires connected to the plain old telephone serv
Which of the following is MOST likely to be used for telephone wires connected to the plain
old telephone service (POTS)?
Which of the following security measures would BEST secure their wireless network?
A company has only three laptops that connect to their wireless network. The company is
currently using WEP encryption on their wireless network. They have noticed unauthorized
connections on their WAP and want to secure their wireless connection to prevent this.
Which of the following security measures would BEST secure their wireless network? (Select
TWO).
Which of the following would an administrator do NEXT once an action plan has been created?
Which of the following would an administrator do NEXT once an action plan has been
created?