Which of the following actions should the technician take?
A user has a laptop running Windows XP and reports that when traveling, the laptop cannot
access the Internet or email. The company uses a static IP address on all laptops. Which of the
following actions should the technician take?
Which of the following printers requires manual alignment?
Which of the following printers requires manual alignment?
Which cable could you use?
You have two workstations. Each workstation has a 100BASE-T network card. You want to
connect the two workstations directly without the use of a hub or switch. Which cable could you
use?
How to rebuild the connection on condition that the current configuration on the router will not be changed?
When configuring a router on a SOHO network, the administrator changed the IP address
scheme and closed DHCP service before configuring the wireless. After updating the router
information, the computer is unable to connect to the router. How to rebuild the connection on
condition that the current configuration on the router will not be changed?
Which of the following should the technician try FIRST?
A user is trying to use their laptop with a video projector and cannot get the projector to display the
computer screen. Which of the following should the technician try FIRST?
Network Address Translation (NAT) provides additional security for users behind a gateway router by
Network Address Translation (NAT) provides additional security for users behind a gateway router
by
Which of the following devices would the user need?
A user has a parallel printer and wants to share it on the company network. Which of the following
devices would the user need?
How would you use to connect the two routers?
Certkiller .com has a routed network. You need to extend the network by adding a second router.
How would you use to connect the two routers?
What is the reason that a user working on a Windows PC can’t access network resources on one of their UN
What is the reason that a user working on a Windows PC can’t access network resources on one
of their UNIX servers?
Which of the following is characterized by the creation of a secure tunnel into a known server location?
Which of the following is characterized by the creation of a secure tunnel into a known server
location?