当前分类: N10-004
问题:单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A Port mirroringB VPNC TrunkingD Port authentication...
查看答案
问题:单选题How many bits are in an IPv6 address?()A 32B 64C 128D 256...
问题:单选题A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend t...
问题:单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A 100Base-T4B 100Base-TXC 100Base-XD 100Base-FX...
问题:单选题Which of the following describes what the number two represents in l00Base2 cabling?()A FiberB Coaxial cableC UTPD Twisted pair...
问题:单选题Which of the following is an invalid IPv4 address?()A 225.0.0.1B 254.254.0.0C 256.0.0.4D 224.2.1.4...
问题:单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MA...
问题:单选题Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?()A ISDNB PSTNC OC-2D T1...
问题:单选题A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's ...
问题:单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A SSIDB WPA2C DHCPD Password...
问题:单选题An administrator is unable to ping a workstation. Which of the following tools would BEST help toresolve the issue?()A Cable testerB MultimeterC Toner probeD Protocol analyzer...
问题:单选题Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A DoSB SmurfC Man-in-the-middleD Phishing...
问题:单选题Data encryption and decryption occurs at which layer of the OSI model?()A TransportB PresentationC SessionD Application...
问题:单选题Which of the following tools can be used to identify the location of a network outage?()A tracerouteB netstatC nslookupD ping...
问题:单选题A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?()A Document the solution and process.B Establish the mo...
问题:单选题A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?...
问题:单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A The wrong cable type has been used.B . IDS has shut down the c...
问题:单选题A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?()A DHCP serverB Proxy serverC RepeaterD DHCP relay...
问题:单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A WPA-PSK encryptionB SSID broadcastC Port forwardingD MAC filtering...