问题:单选题Which of the following WAN protocols is a circuit switching technology?()A ISDNB SONETC Frame RelayD ATM
查看答案
问题:单选题Which of the following components is typically used for voice transmissions and has a 10Mbpsmaximum transfer speed?()A 110 blockB Patch panelC Vertical cross connectD 66 block
问题:单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A 100Base-T4B 100Base-TXC 100Base-XD 100Base-FX
问题:单选题A technician temporarily needs an additional network connection in their office to test a newworkstation. Which of the following is the BEST solution to add a temporary network connection?()A Install a small network switchB Use port mirroring on the switchC Split the pairs of the existing jackD Install a CSU/DSU
问题:单选题Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?()A ISDNB PSTNC OC-2D T1
问题:单选题A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?()A Document the solution and process.B Establish the most probable cause.C Implement and test the solution.D Identify additional symptoms and problems
问题:单选题Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()A Determine what has changedB Test a solution.C Establish the most probable causeD Escalate the problem to the right section
问题:单选题Which of the following is an invalid IPv4 address?()A 225.0.0.1B 254.254.0.0C 256.0.0.4D 224.2.1.4
问题:单选题An administrator is unable to ping a workstation. Which of the following tools would BEST help toresolve the issue?()A Cable testerB MultimeterC Toner probeD Protocol analyzer
问题:单选题Which of the following is used by RADIUS to encrypt messages between the server and the client?()A Public keyB CSU/DSUC Private keyD Shared secret
问题:单选题1000BaseT has a MAXIMUM run distance of:()A 25 meters (82 feet)B 100 meters (328 feet)C 500 meters (1640 feet)D 1000 meters (3280 feet)
问题:单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A Port mirroringB VPNC TrunkingD Port authentication
问题:单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A SSIDB WPA2C DHCPD Password
问题:单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()A StarB RingC BusD Mesh
问题:单选题Data encryption and decryption occurs at which layer of the OSI model?()A TransportB PresentationC SessionD Application
问题:单选题A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type?()A MulticastB DHCPC APIPAD Broadcast
问题:单选题Which of the following authenticates a web server to the remote client in PKI?()A FQDNB DNS nameC Public keyD Private key
问题:单选题An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A Router routes traffic between different networks and a switch does notB The new switch is faulty and needs to be replaced and configured correctlyC The firewall needs to be setup to allow traffic to reach the InternetD The switch needs to be setup to forward data traffic to the Internet
问题:单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MAC filteringC IP filteringD Static IP addresses