Which of the following should be implemented to track this type of work?
A company has gone through several upgrades on their network but unfortunately have no way of
identifying who approved the upgrades. Which of the following should be implemented to track this
type of work?
Which of the following IP address/subnet mask combinations represent a broadcast address?
Which of the following IP address/subnet mask combinations represent a broadcast address?
(Select TWO).
Which of the following would be used on a network to ensure access to resources if a critical host becomes una
Which of the following would be used on a network to ensure access to resources if a critical host
becomes unavailable?
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
Which of the following networking devices can exist at several layers of the OSI model at the same time?
Which of the following networking devices can exist at several layers of the OSI model at the same
time? (Select TWO).
Which of the following utilities did the technician use to check this parameter with the output listed below?
A network technician is trying to run a protocol analyzer and is instructed to record the chimney
offload state of TCP. Which of the following utilities did the technician use to check this parameter
with the output listed below?
Querying active state…
TCP Global Parameters
———————————————-
Receive-Side Scaling State : enabled
Chimney Offload State : disabled
Receive Window Auto-Tuning Level : normal
Add-On Congestion Control Provider : ctcp
ECN Capability : disabled
RFC 1323 Timestamps : disabled
Which of the following is used to explain guidelines for users while using network resources?
Which of the following is used to explain guidelines for users while using network resources?
Which of the following is a path vector routing protocol?
Which of the following is a path vector routing protocol?
Which of the following commands would be used to identify how many hops a data packet makes before reaching it
Which of the following commands would be used to identify how many hops a data packet makes
before reaching its final destination?
Which of the following technologies would BEST accomplish this?
A company has asked the network administrator to restrict access to any websites with
unauthorized material. Which of the following technologies would BEST accomplish this?