当前分类: N10-004
问题:单选题An administrator is deploying three B/G wireless access points in a new office location. Which ofthe following channels eliminates interference?()A 1,6,and 11B 3,6,and 9C 11,16,and 20D 36,40,and 44...
查看答案
问题:单选题Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()A 802.11aB 802.11bC 802.11gD 802.11n...
问题:单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A IS-ISB BGPC OSPFD RIP...
问题:单选题A technician would use a physical network diagram to determine:()A the cause of routing errors.B the number of switches on the network.C the number of users on the network.D where network latency will occur....
问题:单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A MulticastB UnicastC BroadcastD Peer-to-peer...
问题:单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos...
问题:单选题Keyword and blacklist filtering would be handled at which level in a network?()A Layer 2 managed switchB DHCP serverC Hardware firewallD Bridge...
问题:单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78A tracertB pingC arpD netstat...
问题:单选题Which of the following authenticates a web server to the remote client in PKI?()A FQDNB DNS nameC Public keyD Private key...
问题:单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A SMTPB SIPC HTTPD SSL...
问题:单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle...
问题:单选题Which of the following wireless technologies can operate at only 5GHz?()A 802.11b/gB 802.11gC 802.11bD 802.11a...
问题:单选题A standard installation for wireless will use which of the following antenna types?()A SectorB PatchC YagiD Omni-Directional...
问题:单选题A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA) will assign which of the following addresse?()A 172.16.1.25B 169.254.1.25C 10.16.1.25D 192.168.1.25...
问题:单选题Which of the following represents the physical address of a network access card?()A FF01:D2:C4:87::11B 00-30-48-83-9B-C8C 08-9D-35-22-L2-34-FF-21D 2D1A:C3:0:1C3B:2AD://FF://FEBE://9D3A...
问题:单选题In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A MeshB Token ringC StarD Spanning tree...
问题:单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A Logical network diagramB History logsC Baseline configurationsD Wiring schematics...
问题:单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP...
问题:单选题An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?()A nslookupB nbtstatC digD netstat...
问题:单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A The laptop...