Which of the following is the FASTEST cable type that can pass Ethernet traffic?
Which of the following is the FASTEST cable type that can pass Ethernet traffic?
Which of the following BEST describes this security threat?
A small amount of spoofed packets are being sent across a network and a large amount of
reply packets are being sent back to the network resource. Which of the following BEST
describes this security threat?
Which of the following would BEST accomplish this goal?
A Chief Executive Officer (CEO) decided that only a limited number of authorized company
workstations will be able to connect to the Internet. Which of the following would BEST
accomplish this goal?
Which of the following will alleviate this problem?
A coffee shop has hired a technician to install a wireless hot-spot. However, after the hotspot is enabled, it was noted that there were more cars in the parking lot than customers in
the coffee shop. Which of the following will alleviate this problem?
Which of the following cable types is intended to be used on short distances and is immune to any type of inte
Which of the following cable types is intended to be used on short distances and is immune
to any type of interference?
Which of the following connectivity issues did the technician discover?
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the
following connectivity issues did the technician discover?
Which of the following will improve security and MOST likely prevent future breaches?
A SOHO had their wireless network breached on several occasions. The user turned off the
SSID and enabled WEP encryption, but breaches are still occurring. Which of the following
will improve security and MOST likely prevent future breaches?
which of the following layers does the problem MOST likely reside?
An administrator attempts to open a web page and sees the following error: ‘Error 404: Page
not found’. The administrator then uses the ping command and finds that the default
gateway cannot be pinged. At which of the following layers does the problem MOST likely
reside?
Which of the following devices would be used to monitor the network activity?
It has been suspected that one of the users is using the network inappropriately. As a
preventive measure HR has authorized the IT department to enable port mirroring on the
users network port. Which of the following devices would be used to monitor the network
activity?
Which of the following describes this wireless network?
A wireless access point supports up to 20 clients. Which of the following describes this
wireless network?