Which of the following is the main difference between T…
Which of the following is the main difference between TCP and UDP? protocols provide reliable transport. When a computer wants to send data to another computer, TCP will first establish a connection between the two computers. When a sending computer sends data segments, thereceiving computer acknowledges receipt of the segments. If the receiving computer does not receive an expected segment, the sending computer will send it again. provide unreliable transport. With UDP, there is no connection establishment between the sending and receiving computers. If a data segment is lost in transit, the sending computer will not know about it so it will not resend the segment. flags in the TCP header to indicate whether a segment is being used for control purposes or just to carry data.
Which of the following is true about the main differenc…
Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? sessions are HTTP (HyperText Transfer Protocol) sessions which offers no security. Port 443 web sessions use HTTPS. HTTPS uses SSL or TLS to encrypt the HTTP traffic. communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.
Which of the following does a network technician need t…
Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window? question, the network technician has made a change during a maintenance window. The change has not worked so the technician needs to ‘undo’ the change he made to revert the system back to its previous state.
Which of the following will allow quick identification …
A network technician is attempting to locate a switch connected to the fourth floor west side of the building.
Which of the following will allow quick identification of the switch, when looking at a logical diagram? naming switches, using names like Switch1, Switch2 etc. for example won’t help when you need to know where the switches are located. convention like SW1-FL4-WS where SW1 identifies the item as a Switch with the number 1, FL4 identifies the location as Floor 4 and WS further identifies the location as West Side. Using this convention, switch number 2
Which of the following best practices will alleviate ma…
In an engineering office, all plotters are configured via static IP.
Which of the following best practices will alleviate many issues if equipment moves are required? (SelectTWO). cables connecting to each wall plate terminate), we’ll be able to see which device is connected to which port. If equipment moves are required, we will be able to easily see which patch cables need to be moved in the patch panel.
Which of the following systems are they MOST likely dis…
An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation.
Which of the following systems are they MOST likely discussing? from both sides. On one side of the rack is cabling that connects the service provider’s network. The other side of the rack is for the connections to the customer’s equipment.
Which of the following resources should be consulted?
A technician has prolonged contact with a thermal compound.
Which of the following resources should be consulted? information on the potential hazards of working with a chemical product and how to work safely with the chemical product. effects of prolonged contact with the thermal compound.
In an IT project, the SOW would define what tasks will …
A service provider is unable to maintain connectivity to several remote sites at predetermined speeds.
The service provider could be in violation of the: standard of service that a customer can expect from a supplier. SLA’s are particularly common in the I. statement of work is often issued at the start of the project. project. In an IT project, the SOW would define what tasks will be performed (hardware and software upgrades etc.), why the work is being done and how long each stage of the project will take.
which of the following?
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file.
This standards and policies document is usually called which of the following? or her computer during business hours. For example, using the company’s Internet connection to look at the sports scores on a sports website may be deemed inappropriate or unacceptable during business hours. Other examples include the use of social media websites such as Facebook or using Instant Messaging clients to chat to your friends.
Which of the following should the technician check to e…
A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition.
Which of the following should the technician check to ensure the new host will connect?