当前分类: N10-004
问题:单选题A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A RouteB IfconfigC NetstatD Nslookup...
查看答案
问题:单选题A user is unable to reach the Internet. The technician asks the user to do an IPCONFIG /all. The userreports that their IP address is 172.16.1.18, subnet mask is 255.255.255.0, and their default gateway is 172.16.1.18. Which of the following is the cau...
问题:单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle...
问题:单选题Which of the following is primarily used for VoIP?()A TLSB RDFC NTPD RTP...
问题:单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A MulticastB UnicastC BroadcastD Peer-to-peer...
问题:单选题After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()A Crossover cable with open pairsB Crossover cableC Rollover cableD St...
问题:单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP...
问题:单选题Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A Network diagramB Performance baselineC Network security procedureD Company policy...
问题:单选题Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()A TrunkingB LANC VPND Peer to peer...
问题:单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos...
问题:单选题Which of the following authenticates a web server to the remote client in PKI?()A FQDNB DNS nameC Public keyD Private key...
问题:单选题Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?()A Multica...
问题:单选题Keyword and blacklist filtering would be handled at which level in a network?()A Layer 2 managed switchB DHCP serverC Hardware firewallD Bridge...
问题:单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A IS-ISB BGPC OSPFD RIP...
问题:单选题An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?()A MultimeterB SnipsC Toner probeD Punch down tool...
问题:单选题Which of the following wireless technologies can operate at only 5GHz?()A 802.11b/gB 802.11gC 802.11bD 802.11a...
问题:单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78A tracertB pingC arpD netstat...
问题:单选题A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA) will assign which of the following addresse?()A 172.16.1.25B 169.254.1.25C 10.16.1.25D 192.168.1.25...
问题:单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A Logical network diagramB History logsC Baseline configurationsD Wiring schematics...
问题:单选题Which of the following layers of the OSI model is the presentation layer?()A Layer 1B Layer 5C Layer 6D Layer 7...