Which of the following will provide the GREATEST level of detail?
A network technician wants to baseline traffic flows on a specific network. Which of the following
will provide the GREATEST level of detail?
Which of the following would MOST likely resolve the users’ connection issues?
An administrator is setting up a secure wireless network. The administrator decides to support
802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key,
but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported
connection issues. Which of the following would MOST likely resolve the users’ connection issues?
Which of the following devices can be used to offload outbound web server SSL encryption overhead?
Which of the following devices can be used to offload outbound web server SSL encryption
overhead?
Which of the following tools would be MOST useful in this scenario?
An administrator is troubleshooting analog telephony issues on the punch down block. Which of the
following tools would be MOST useful in this scenario?
Which of the following is MOST likely the reason?
An administrator has received a recommendation against deploying WEP as a wireless encryption
protection scheme. Which of the following is MOST likely the reason?
Which of the following must the network administrator do?
A network administrator has been assigned the 192.168.2.64/26 network and assigns the following
computer’s IP addresses:
192.168.2.70
192.168.2.100
192.168.2.125
192.168.2.130
When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not
received. Which of the following must the network administrator do?
Which of the following cable types is unshielded?
Which of the following cable types is unshielded?
Which of the following wireless standards can transmit data up to 540Mbps?
Which of the following wireless standards can transmit data up to 540Mbps?
Which of the following is the underlying cause?
A user calls the helpdesk to report not being able to access network resources over the company’s
Wi-Fi connection. During information gathering, the user mentions that the wireless network their
computer is signed into is not the same name as it had been previously. Which of the following is the
underlying cause?
which of the following protocols?
Using source port numbers as a way to keep track of connections is a characteristic of which of the
following protocols?