更多“单选题Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A IDFB 66 blockC MDFD 110 block”相关问题
  • 第1题:

    Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()

    • A、IDF
    • B、66 block
    • C、MDF
    • D、110 block

    正确答案:D

  • 第2题:

    Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()

    • A、568A
    • B、568B
    • C、Crossover
    • D、Loopback

    正确答案:C

  • 第3题:

    A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()

    • A、Cable tester
    • B、Multimeter
    • C、Loop back plugs
    • D、Crossover cable

    正确答案:A

  • 第4题:

    Which of the following holds multiple connections and is usually maintained by the telephone company?()

    • A、Demarc
    • B、IDF
    • C、MDF
    • D、110 block

    正确答案:A

  • 第5题:

    Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()

    • A、tracert
    • B、netstat
    • C、nslookup
    • D、ping

    正确答案:A

  • 第6题:

    单选题
    A small push button typically found on the inside of a server case is MOST likely used for which of the following purposes?()
    A

    UID switch

    B

    Power switch

    C

    Cooling fan switch

    D

    Chassis intrusion switch


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()
    A

    Unmanaged switch

    B

    Hardware firewall

    C

    Hub

    D

    Managed switch


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

    AES

    B

    TKIP

    C

    802.1q

    D

    ISAKMP


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()
    A

    568A

    B

    568B

    C

    Crossover

    D

    Loopback


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()
    A

    Straight

    B

    Console

    C

    Crossover

    D

    Loopback


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
    A

    Baseline configuration

    B

    Security policy

    C

    Performance and transaction logs

    D

    Physical network diagram


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()
    A

    Network data cables are damaged.

    B

    Memory has become unseated.

    C

    The user has defragmented the hard drive.

    D

    Processor cooling fan is not functioning.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()

    • A、Network data cables are damaged.
    • B、Memory has become unseated.
    • C、The user has defragmented the hard drive.
    • D、Processor cooling fan is not functioning.

    正确答案:D

  • 第14题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、 AES 
    • B、 TKIP
    • C、 802.1q
    • D、 ISAKMP

    正确答案:D

  • 第15题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第16题:

    A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()

    • A、MAC filtering
    • B、PoE
    • C、IP filtering
    • D、802.1X

    正确答案:D

  • 第17题:

    单选题
    For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?()
    A

    255.255.0.0

    B

    255.255.248.0

    C

    255.255.255.0

    D

    255.255.255.255


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()
    A

    tracert

    B

    netstat

    C

    nslookup

    D

    ping


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    A snatch block would most likely be used as a().
    A

    boat fall

    B

    fairlead

    C

    riding pawl

    D

    topping lift


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

     AES 

    B

     TKIP

    C

     802.1q

    D

     ISAKMP


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()
    A

    MAC filtering

    B

    PoE

    C

    IP filtering

    D

    802.1X


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()
    A

    Cable tester

    B

    Multimeter

    C

    Loop back plugs

    D

    Crossover cable


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
    A

    IDS

    B

    VPN

    C

    NIPS

    D

    HIDS


    正确答案: A
    解析: 暂无解析