Which of the following protocols does a router use to communicate packets to other routers?
Which of the following protocols does a router use to communicate packets to other routers?
Which of the following configuration management documents will allow an administrator to troubleshoot…
Which of the following configuration management documents will allow an administrator to troubleshoot a connectivity problem with a CAT5e cable?
Which of the following settings needs to be changed?
A network technician has configured a server with the following IP settings:IP Address:
192.168.1.40/27Default Gateway: 192.168.1.64DNS: 192.168.1.33The server cannot access the Internet. Which of the following settings needs to be changed?
Which of the following is the BEST way to mitigate an attack on the network?
An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?
Which of the following identifies the WLAN a user is connected to?
Which of the following identifies the WLAN a user is connected to?
Which of the following channel combinations would allow all three WAPs to operate without interfering with eac
A network technician is installing multiple 802.11g WAPs with the same SSID. Which of the following channel combinations would allow all three WAPs to operate without interfering with each other?
Which of the following is the BEST reason why satellite connectivity for VoIP applications should not be used?
Which of the following is the BEST reason why satellite connectivity for VoIP applications should not be used?
Which of the following should the user do to help with signal strength?
A user is getting very weak signals while trying to connect to wireless. Which of the following should the user do to help with signal strength?
Which of the following monitoring techniques would BEST be used?
An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used?
Which of the following would MOST likely resolve the users connection issues?
An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users connection issues?