Which of the following network protocols is used toresolve FQDNs to IP addresses?
Which of the following network protocols is used toresolve FQDNs to IP addresses?
Which of the following network protocols is used for a secure command line interface for management of network
Which of the following network protocols is used for a secure command line interface for management of
network devices?
Which of the following network protocols is used totransport email between servers?
Which of the following network protocols is used totransport email between servers?
Which of the following network troubleshooting methodology steps should the technician do NEXT?
A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user
can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The
technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine.
Which of the following network troubleshooting methodology steps should the technician do NEXT?
Which of the following is the MOST likelycause of the problem?
Ann, a technician, installs a new WAP and users areable to connect; however, users cannot access the
Internet. Which of the following is the MOST likelycause of the problem?
Which of the following traffic types is MOST likely using port 25?
An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The
administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but st
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but
still allow already connected users to continue to connect?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following tools can provide the verification?
Users have reported issues accessing an Internet website. The network technician wants to verify network
layer connectivity. Which of the following tools can provide the verification?
Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large
amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the
user’s PC?