which of the following is the FIRST step a technician should take?
Multiple users are reporting network issues. Before taking any course of action, which of the following is the FIRST step a technician should take?
Which of the following devices does not limit network broadcast traffic and does not increase performance?
Which of the following devices does not limit network broadcast traffic and does not increase performance?
Which of the following is the MOST likely cause?
A mobile user reports that after receiving a new patch cable for their laptop, the laptop is unable to connect to the network. An administrator verifies that the port is configured correctly and the LAN drop is active. Which of the following is the MOST likely cause?
Which of the following tools should be utilized in this situation?
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected computer is on the network and checks if a node is saturating the network. Which of the following tools should be utilized in this situation?
Which of the following is the FIRST step in the troubleshooting methodology that should be performed?
An administrator is at a client’s site to figure out an intermittent network problem. Which of the following is the FIRST step in the troubleshooting methodology that should be performed?
When installing a new secure wireless network the administrator should turn on:
When installing a new secure wireless network the administrator should turn on:
Which of the following MUST be changed in order to allow HOST A to talk to HOST B?
An administrator has configured two hosts as follows:
HOST A
IP 192.168.3.100
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
HOSTB
IP 192.168.1.200
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
Which of the following MUST be changed in order to allow HOST A to talk to HOST B?
Which of the following Internet technologies would provide the GREATEST bandwidth?
Which of the following Internet technologies would provide the GREATEST bandwidth?
Which of the following mitigation techniques is MOST effective against a man-in-the-middle attack?
Which of the following mitigation techniques is MOST effective against a man-in-the-middle attack?
Which of the following network technologies would BEST handle voice traffic prioritization above all other dat
A company recently installed a new VoIP phone system that runs over their existing T3 Internet connection. Which of the following network technologies would BEST handle voice traffic prioritization above all other data?