Which of the following addressing mechanisms should the technician use to provide access and IP addresses for
A technician is setting up a network for 25 users at a remote location. All of the users share
a single Internet connection. The ISP provides a single IP address for the location. Which of
the following addressing mechanisms should the technician use to provide access and IP
addresses for all 25 users?
Which of the following tools would a technician use to attach a new connector to eliminate this issue?
A technician has noticed that the RJ-45 connector on the end of a users patch cable was
stripped too far back from the connector allowing for cross talk. Which of the following tools
would a technician use to attach a new connector to eliminate this issue?
Which of the following is MOST likely to be used for telephone wires connected to the plain old telephone serv
Which of the following is MOST likely to be used for telephone wires connected to the plain
old telephone service (POTS)?
Which of the following security measures would BEST secure their wireless network?
A company has only three laptops that connect to their wireless network. The company is
currently using WEP encryption on their wireless network. They have noticed unauthorized
connections on their WAP and want to secure their wireless connection to prevent this.
Which of the following security measures would BEST secure their wireless network? (Select
TWO).
Which of the following would an administrator do NEXT once an action plan has been created?
Which of the following would an administrator do NEXT once an action plan has been
created?
Which of the following is the reason why visitors are unable to connect?
An office is using 802.11a to network the entire office. When a visitor brings a personal
laptop to the office, the visitor is not able to connect to the network. Which of the following is
the reason why visitors are unable to connect?
Which of the following wireless encryption methods should they employ?
A company wants to implement a wireless encryption method, but wants the key to be a
simple phrase so they can easily allow visitors to connect. Which of the following wireless
encryption methods should they employ?
172.20.0.112 represents an address at which of the following layers of the OSI model?
172.20.0.112 represents an address at which of the following layers of the OSI model?
Which of the following network addresses would the administrator use to accommodate this request?
An administrator needs to create a subnet that will accommodate up to 4000 hosts on the
same subnet but not more than 6000. Which of the following network addresses would the
administrator use to accommodate this request?
Which of the following is MOST likely the cause of the problem?
A distribution layer switch with an SC GBIC that has a fiber connection back to the core has
gone bad and needs to be replaced with a newer model and an LC GBIC. The fiber patch
cable was replaced with a known good LC patch cable. After replacing the switch, the fiber
connection shows no link. Which of the following is MOST likely the cause of the problem?