which of the following reasons could a single server# s NIC transmit packets from multiple MAC address sources
For which of the following reasons could a single server# s NIC transmit packets from multiple MAC address sources?
Which of the following protocols is used to dynamically assign IP addresses to network devices?
Which of the following protocols is used to dynamically assign IP addresses to network devices?
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outsi
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
Which of the following Ethernet cable types would be used to minimize EMI interference?
The network technician needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following Ethernet cable types would be used to minimize EMI interference?
Which of the following tools should the network technician use to verify the cable?
The network technician needs to verify that a cable is in good condition and works properly. Which of the following tools should the network technician use to verify the cable?
Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
After installing new cabling, a technician notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
Which of the following should also be implemented to prevent unauthorized devices from connecting?
A customer has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on the customer# s wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO).
An IPS appliance that uses statistical analysis to identify network traffic anomalies is said to be:
An IPS appliance that uses statistical analysis to identify network traffic anomalies is said to be:
Which of the following applications are extremely sensitive to latency?
Which of the following applications are extremely sensitive to latency? (Select TWO).
Which of the following should be considered for security?
A technician is asked to install a new wireless router, and make sure access to the new wireless network is secured. Which of the following should be considered for security?