Which of the following software tools is used to check if NetBIOS is enabled?
Sandy, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the
server is successful. Which of the following software tools is used to check if NetBIOS is enabled?
Which of the following uses a Management Information Base (MIB) to monitor the network?
Which of the following uses a Management Information Base (MIB) to monitor the network?
Which of the following does SNMPv3 BEST provide over previous versions?
Which of the following does SNMPv3 BEST provide over previous versions?
Which of the following commands could be used on the server to confirm that the web service is running?
Users report that an internal web server is not responding. Which of the following commands could
be used on the server to confirm that the web service is running?
Which of the following commands should he use to determine this?
Kurt, a technician, working remotely cannot connect to the database server. The server does not
respond when he tries to ping it. Kurt wants to determine which network device is preventing ping
from responding. Which of the following commands should he use to determine this?
Which of the following tools would Kurt, an administrator, use to identify opens and shorts?
Which of the following tools would Kurt, an administrator, use to identify opens and shorts?
Which of the following tools should she use to check the integrity of the cable?
Karen, an administrator, has created a patch cable. Which of the following tools should she use to
check the integrity of the cable?
Port scanners and packet sniffers differ in functionality because:
Port scanners and packet sniffers differ in functionality because:
Which of the following configuration management methods has been overlooked?
Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the
equipment does not match the documentation from 2007. Which of the following configuration
management methods has been overlooked?
Which of the following is a method to prioritize network traffic coming from VoIP phones?
Which of the following is a method to prioritize network traffic coming from VoIP phones?