当前分类: N10-004
问题:单选题Keyword and blacklist filtering would be handled at which level in a network?()A Layer 2 managed switchB DHCP serverC Hardware firewallD Bridge...
查看答案
问题:单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A IS-ISB BGPC OSPFD RIP...
问题:单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos...
问题:单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A NTPB FTPC RTPD IGMP...
问题:单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A WPA-PSK encryptionB SSID broadcastC Port forwardingD MAC filtering...
问题:单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged i...
问题:单选题Which of the following wireless technologies can operate at only 5GHz?()A 802.11b/gB 802.11gC 802.11bD 802.11a...
问题:单选题Which of the following devices allows multiple internal IP addresses to access an external websitewith minimal impact to the network bandwidth?()A ProxyB Load balancerC RouterD Bandwidth shaper...
问题:单选题Which of the following protocols uses port 119, by default?()A NNTPB NTPC TFTPD FTP...
问题:单选题Which of the following authenticates a web server to the remote client in PKI?()A FQDNB DNS nameC Public keyD Private key...
问题:单选题Which of the following WAN protocols is a circuit switching technology?()A ISDNB SONETC Frame RelayD ATM...
问题:单选题Which of the following is used to reduce the number of public IP addresses required?()A RADIUSB SNATC PATD NAT...
问题:单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A Logical network diagramB History logsC Baseline configurationsD Wiring schematics...
问题:单选题Which of the following should be configured to provide priority to voice traffic?()A Port mirroringB DMZC QosD Trunking...
问题:单选题Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A Network diagramB Performance baselineC Network security procedureD Company policy...
问题:单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle...
问题:单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A MulticastB UnicastC BroadcastD Peer-to-peer...
问题:单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP...
问题:单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78A tracertB pingC arpD netstat...