问题:单选题Which of the following would be used to optimize network performance and increase bandwidth availability?()A Packet analysisB QoSC Traffic shapingD Fault tolerance
查看答案
问题:单选题A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?()A Document the solution and process.B Establish the most probable cause.C Implement and test the solution.D Identify additional symptoms and problems
问题:单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A SSIDB WPA2C DHCPD Password
问题:单选题A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()A 802.11aB 802.11bC 802.11gD 802.11n
问题:单选题Which of the following wireless standards has the highest maximum data rate?()A 802.11nB 802.11bC 802.11aD 802.11g
问题:单选题An administrator is unable to ping a workstation. Which of the following tools would BEST help toresolve the issue?()A Cable testerB MultimeterC Toner probeD Protocol analyzer
问题:单选题Two autonomous networks who wish to exchange routing data should use which of the following protocols?()A OSPFB BGPC EIGRPD IS-IS
问题:单选题A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()A The switches are not stackableB The cable was not wired using 568AC The cable needs to be a crossover cableD The switches have IGMP snooping enabled
问题:单选题Which of the following is a secure method of copying information over a public network?()A SCPB SMTPC SNMPD TFTP
问题:单选题Which of the following connector types is commonly identified by two rows of pins with four in onerow and five in the other?()A DB-9B RJ-45C SCD BNC
问题:单选题Data encryption and decryption occurs at which layer of the OSI model?()A TransportB PresentationC SessionD Application
问题:单选题Which of the following is an invalid IPv4 address?()A 225.0.0.1B 254.254.0.0C 256.0.0.4D 224.2.1.4
问题:单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A Port mirroringB VPNC TrunkingD Port authentication
问题:单选题Which of the following protocols should be used to monitor network performance?()A SNTPB SMTPC HTTPD SNMP
问题:单选题Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?()A ISDNB PSTNC OC-2D T1
问题:单选题A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type?()A MulticastB DHCPC APIPAD Broadcast
问题:单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MAC filteringC IP filteringD Static IP addresses
问题:单选题Which of the following tools allows an administrator to determine the MAC address of another computer?()A pingB arpC ifconfigD ipconfig
问题:单选题Which of the following monitors a server to see which protocols might be in use?()A Ping sweepB Intrusion detection softwareC Port scannerD Wireless packet sniffer
问题:单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A 100Base-T4B 100Base-TXC 100Base-XD 100Base-FX