Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?
Which of the following tools would a technician use to determine if a CAT6 cable is properly
terminated?
Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps?
Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to
108Mbps?
Which of the following would be the primary purpose of doing this?
The systems administrator has assigned an IP address and default gateway to a standard Layer 2
switch. Which of the following would be the primary purpose of doing this?
Which of the following is MOST likely the problem?
Ann, a technician, installs a wireless router in a network closet in a large office. She then configures
all workstations in various offices on that floor to use the wireless connection. Maximum connection
speed at each workstation is 54 Mbps. Some users complain that their network connection is very
slow. Which of the following is MOST likely the problem?
Which of the following dynamic routing protocols selects routing paths based upon hop count?
Which of the following dynamic routing protocols selects routing paths based upon hop count?
Which of the following network troubleshooting methodology steps should Joe have performed FIRST?
A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots
the switches and the router since the network is down. Which of the following network
troubleshooting methodology steps should Joe have performed FIRST?
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all i
Which of the following performs authentication and provides a secure connection by using 3DES to
encrypt all information between two systems?
which of the following layers of the OSI model?
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the
OSI model? (Select TWO).
Which of the following would need to be configured to prevent any further attacks from that IP address?
Several users are reporting connectivity issues with their laptops. Upon further investigation, the
network technician identifies that their laptops have been attacked from a specific IP address
outside of the network. Which of the following would need to be configured to prevent any further
attacks from that IP address?
Which of the following utilities can a technician use to determine the IP address of the client’s machine?
A client’s computer is unable to access any network resources. Which of the following utilities can a
technician use to determine the IP address of the client’s machine?