当前分类: N10-004
问题:单选题Data encryption and decryption occurs at which layer of the OSI model?()A TransportB PresentationC SessionD Application...
查看答案
问题:单选题Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?()A ISDNB PSTNC OC-2D T1...
问题:单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A SSIDB WPA2C DHCPD Password...
问题:单选题Which of the following is used to reduce the number of public IP addresses required?()A RADIUSB SNATC PATD NAT...
问题:单选题After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()A Crossover cable with open pairsB Crossover cableC Rollover cableD St...
问题:单选题A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's ...
问题:Which of the following interfaces is used to connect analog...
问题:单选题An administrator is unable to ping a workstation. Which of the following tools would BEST help toresolve the issue?()A Cable testerB MultimeterC Toner probeD Protocol analyzer...
问题:单选题Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()A GatewayB HubC BridgeD Router...
问题:单选题Which of the following tools allows an administrator to determine the MAC address of another computer?()A pingB arpC ifconfigD ipconfig...
问题:单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A Port mirroringB VPNC TrunkingD Port authentication...
问题:单选题Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?()A StripperB Punch down toolC Butt setD Snips...
问题:单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MA...
问题:单选题Which of the following is an invalid IPv4 address?()A 225.0.0.1B 254.254.0.0C 256.0.0.4D 224.2.1.4...
问题:单选题A small business with eight employees has just opened their office in a renovated loft in a busy downtown area. The owner of the building does not want to run any additional wiring beyond power, to preserve the historic nature of the building. Because ...
问题:单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A 100Base-T4B 100Base-TXC 100Base-XD 100Base-FX...
问题:单选题Which of the following uses copper wiring?()A 10GBase-ERB 10GBase-LWC 100Base-FXD 1000Base-T...
问题:单选题A user plugged a cable between two network jacks that attach to the same switch and caused a broadcast storm. Which of the following would have prevented the broadcast storm?()A Spanning treeB VLAN taggingC 802.1xD Port mirroring...
问题:单选题A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?()A Document the solution and process.B Establish the mo...
问题:多选题Which of the following ports are used by default for web servers? ()(Select TWO)A80B110C123D143E443...