If you want to transfer passwords via the internet in clear text, which authentication protocol will be used?
If you want to transfer passwords via the internet in clear text, which authentication protocol will be used?
What IP (Internet Protocol) address should the administrator assign to the router?
A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Internet Protocol) address on each subnet for the router interface. What IP (Internet Protocol) address should the administrator assign to the router?
When crimping a RJ-45 connector, which pin-out configuration is often used?
RJ45 is a standard type of connector for network cables such as those used in Ethernet networks. When crimping a RJ-45 connector, which pin-out configuration is often used?
The function of a tone generator is to generate a tone to test:
The function of a tone generator is to generate a tone to test:
Which of the following is associated with dynamic port bonding?
Which of the following is associated with dynamic port bonding?
What can you do to this problem?
You are the network administrator at certways .com. certways.com has several workstations that have wireless 802.11g network adapters. Every day at around lunchtime wireless users complain of lack of connectivity.
What can you do to this problem?
Select one tool from the following to physically attach a J-45 connector to a CAT5 cable.
RJ45 is a standard type of connector for network cables such as those used in Ethernet networks. Select one tool from the following to physically attach a J-45 connector to a CAT5 cable.
Which is a client-server based authentication software system that maintains user data in a central database?
The term client-server refers to a popular model for computer networking that utilizes client and server devices each designed for specific purposes. Which is a client-server based authentication software system that maintains user data in a central database?
What step must be taken so that the clients can access the Novell server?
There are three Windows 2000 servers, a NetWare server, and ten Windows 2000 clients. A networktechnician installs NWLINK on the Windows servers and clients, yet the clients cannot access the Novell server. What step must be taken so that the clients can access the Novell server?
How to resolve this intermittent issue?
The wired workstations can’t connect to the file server after installing a new wireless router. How to resolve this intermittent issue?