Which of the following is the MOST likely problem?
Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses.
Which of the following is the MOST likely problem?
Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?
Which of the following is the MOST likely cause?
A new monitoring device is installed in the network that uses ping to determine whether critical
network Internet routers are up. After three missing pings, the alarm reports the device is down.
The device is now constantly reporting alarms, yet there are no reported Internet problems from
users. Which of the following is the MOST likely cause?
Which of the following should Zach consider before installing the new devices?
Zach, a technician, is installing a new wireless network. There are currently no wireless devices in the area. Which of the following should Zach consider before installing the new devices?
Which of the following is the MOST likely reason?
A network technician configures a firewall to block only certain IP addresses from accessing the
Internet. All users are reporting that they are unable to access the Internet. Which of the following
is the MOST likely reason?
Which of the following steps in the troubleshooting methodology should the technician do NEXT?
Zach, a user, cannot access any network resources. The technician has determined that the problem is isolated to Zach, and that there have not been any changes to his workstation or switch port recently. Which of the following steps in the troubleshooting methodology should the technician do NEXT?
Which of the following protocols is used for remote management of devices?
Which of the following protocols is used for remote management of devices?
Which of the following could be used to limit the access to the wireless network?
Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).
which of the following authentication techniques?
A DSL modem connects to the providers network using which of the following authentication
techniques?
Which of the following cable types should a technician use for this computer?
Zach, a customer, wants to network several computers within a large warehouse. The warehouse has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer?