Which of the following would BEST accomplish this?
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes
from. Which of the following would BEST accomplish this?
Which of the following can be configured to allow two of the subnets to communicate directly with each other a
A user has three different subnets in an office. Which of the following can be configured to allow
two of the subnets to communicate directly with each other at the switch level?
Which of the following is MOST likely the reason?
A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The
APs appear to interfere with each other. Which of the following is MOST likely the reason?
Which of the following tools would MOST likely help prove this hypothesis?
A user is having trouble with their fax machine disconnecting during transmissions. The technician
believes that a DSL signal may be on the same line as the fax. Which of the following tools would
MOST likely help prove this hypothesis?
Which of the following uses types and codes rather than ports?
Which of the following uses types and codes rather than ports?
Which of the following tools can be used to resolve the domain of the public IP address?
A network administrator is reviewing logs and notices that a device with a public IP address is
trying to access the web server RDP port. Which of the following tools can be used to resolve the
domain of the public IP address?
Which of the following commands can be used to verify DNS is functioning properly?
A technician is having issues accessing the Internet from the workstation. They are able to ping
the DNS server and their default gateway. Which of the following commands can be used to verify
DNS is functioning properly?
Which of the following could be the cause of this failure?
Two workstations are unable to communicate on the network despite having known good cables.
When one device is unplugged from the network the other device functions properly. Which of the
following could be the cause of this failure?
Which of the following protocols are used to provide accurate time to network devices?
Which of the following protocols are used to provide accurate time to network devices?
Which of the following provides the STRONGEST security for a tunneled connection over the Internet?
Which of the following provides the STRONGEST security for a tunneled connection over the
Internet?