CompTIA Net+ Plus

Card Set Information

Author:
pulse077
ID:
9873
Filename:
CompTIA Net+ Plus
Updated:
2010-03-13 17:02:28
Tags:
CompTIA Net Net Plus N10 004
Folders:

Description:
CompTIA Net+ Training
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user pulse077 on FreezingBlue Flashcards. What would you like to do?


  1. Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?
    MPLS
  2. 
    tracert
  3. Which of the following command line tools would BEST be used to verfiy DNS functionality??
    dig
  4. After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is no longer able to send packets with a size of 1501 bytes. Which of the following is the case??
    The router at the other end of the WAN link is configured with an MTU of 1500
  5. Which of the following protocols are used in VoIP?
    • RTP
    • SIP
  6. Which of the following commands would allow a technician to see the DNS servers that a computer is configured to use?
    nslookup
  7. A technician needs to connect a laptop via the small office, home office (SOHO) wireless access point. When the technician does a site survey using the laptop, the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?
    The SSID is set to not broadcast.
  8. A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?
    SYN-ACK
  9. An automated application capable of infecting computers without user interaction would be described as which of the following?
    Worm
  10. Which of the following does a star ring topology use for data transfer?
    Token passing
  11. A network technician has addressed an issue where many workstations have lost network connectivity, but is not able to establish the most probable cause. Which of the following steps should be taken next to resolve this issue?
    Escalate the issue to a senior network associate.
  12. Which of the following protocols allows secure access to a VPN??
    PPTP
  13. An administor is using a packet analyzer across a single switch but is only receiving partial packet information. Which of the following would need to be implemented on the switch for the administrator?
    Port Mirroring
  14. A network technician has been asked to retrieve device statistics, information, and errors. Which of the following tools would the technician likely use??
    SNMP
  15. Which of the following IEEE standards describesd the power output of a standard port?
    802.3af
  16. Which of the following WAN technologies uses thirty 64Kbs channels?
    E-1
  17. A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location?
    IDF (intermediate distribution frame)
  18. Which of the following is a benefit of using dynamic routing as opposed to static routing?
    Scales to large networks
  19. Which of the following would be an appropriate use of an EGP?
    Advertising a /24 to an upstream provider.
  20. All of the workstations at a company have a static IP address. A newly deployed workstation is unable to connect to the company intranet server using an Internet browser. The technician can ping the intranet servers IP adderss. The MOST likely cause of this in an incorrect:
    DNS server setting on the client.
  21. Which of the following is an example of a valid MAC address for a workstation?
    00:08:38:05:B5:F4
  22. A technician wants to see how many server connections are open on a client machine. Which of the following is the command to see these connections?
    netstat
  23. Which of the following is a valid IP address in the public addressing scheme?
    168.192.10.1
  24. Which of the following will have problems functioning if a firewall has been set up to block all UDP traffic?
    A VoIP device
  25. The difference between 10Base-T and 100Bse-T is:
    shorter timing between Ethernet frames
  26. Which of the following is a part of the TCP/IP protocol suite?
    UDP
  27. Which of the following BEST explains the purpose of a DMZ??
    To create a security zone that allows public traffic but is isolated from the private network.
  28. How much bandwidth does an OC-12 provide?
    622Mbps
  29. Which of the following protocols should be used to securely copy a file?
    • SFTP
    • SCP
  30. A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the error counters on the interface are incrementing. Which of the following could be causing the problems?
    Duplex mismatch
  31. Which of the following equipment would allow for routing based on logical addresses?
    Layer 3 switch
  32. A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?
    Infared
  33. A network administrator configured several network devices earlier today, but now the Internet is no longer avialable to sever users. Which of the following logs should the network administrator reference to help identify the problem?
    History logs
  34. Which of the following items changes the encryption key on a users session after a set period of time?
    TKIP
  35. Which of the following is the maximum speed available from a full T1 line?
    1.544Mbps
  36. According to the OSI model, which of the following layers is responsible for providing reliable communication?
    Transport
  37. A network technician is trying to find out the NETBIOS name of another workstation using its IP address, which of the following commands would be used to find this information?
    nbstat
  38. Which of the following is the number of bits used for IPv6?
    128
  39. Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?
    ARP
  40. Which of the following remote access solutions allows the LEAST connection overhead?
    SSL VPN
  41. Which of the following is a utility that translates the IP address to its physical network address?
    arp
  42. Which of the following is the default port for SMTP?
    25
  43. A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view?
    OSPF
  44. Which of the following protocols allows email to be viewed while remaining on the email server?
    IMAP4
  45. When creating a fault tolerant switched network, which of the following will allow for loops in the switched topology while preventing a broadcast storm?
    Spanning tree protocol
  46. Which of the following logical topologies uses centralized authentication?
    Client/server
  47. A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?
    Implement an action plan
  48. An administrator is implementing a new wireless network. Which of the following is the highest level of wireless encryption that the administrator can run?
    WPA2 AES
  49. When connecting two switches together, which of the following protocols would be used to trunk multiple VLAN traffic across the same physical link?
    802.1q
  50. A user reports that they cannot access any network resources. Which of the following tools would a technician use to troubleshoot the problem?
    Cable tester
  51. Which of the following layers of the OSI model does a network router perform traffic routing at?
    Layer 3
  52. How many DS0s are used in a T1?
    24
  53. When connecting two devices for voice on a vertical connect, which of the following cables would be used to connect the two devices?
    25 pair cable
  54. After installing a new switch and connecting redundant uplinks to other switches, a LAN experiences a broadcast storm causing severe throughput problems. Which of the following is the MOST likely cause of the broadcast storm?
    Spanning-tree protocol was not operational on the LAN.
  55. Which of the following is the maximum range of 10GBase-SR?
    990 feet (302 meters)
  56. A technician is troubleshooting a switch and has identified the symptoms. Which of the following steps should the technician take NEXT?
    Determine the scope of the problem
  57. A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?
    Channels 6-6-6
  58. Which of the following network topologies would BEST prevent downtime in a WAN environment?
    Mesh
  59. A technician can successfully remote into the company's server. However, the technician cannot connect to any of the servers directories from the server itself, but can ping them via an IP address. Which of the following could be the problem?
    DNS is not correctly configured
  60. Which of the following protocols enables administrators to control network devices like routers and switches?
    SNMP
  61. Which of the following types of WAN technologies uses cell switching?
    ATM
  62. Which of the following network devices routes packets over a wireless network?
    WAP
  63. A corporate network has grown and manual monitoring of the network devices are no longer feasible. Which of the following would provide central logging for all devices with message priority levels?
    Install a syslog server and configure the network devices to send log messages to it.
  64. Routing convergence time is which of the following?
    Time required by protocols to update their forwarding tables after changes have occurred
  65. A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?
    The workstation is configured with the incorrect default gateway.
  66. Which of the following cables has a solid Kevlar center to restrict it from making a 90 degree bend?
    CAT6
  67. Which of the following network media has the maximum segment length?
    Single Mode Fiber
  68. Which of the following logs would let the network administrator know that there are performance and network issues within the LAN?
    System logs
  69. Which of the following logs would let the network administrator know that there are performance and network issues within the LAN?
    System logs
  70. A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?
    Configure traffic shaping to reduce the bandwidth available to the file sharing application.
  71. Which of the following VPN protocols runs over port 1723 and allows encryption to be done at teh data level?
    PPTP
  72. Which of the following is implemented on multiple switches to allow alternate paths?
    Spanning tree
  73. Which of the following cables is used to connect multiple layer 2 switches?
    Crossover
  74. Which of the following is the MOST secure wireless encryption?
    WPA2
  75. Which of the following cable types transmits data over 100Mbps per direction?
    10GBase-T
  76. Which of the following are forms of gigabet Ethernet that require the use of fiber optic cables?
    • 1000Base-SX
    • 1000Base-LX
    • 1000Base-CX
  77. Which of the following authentication protocols uses plain text to transmit passwords over the internet?
    PAP
  78. Which of the following would be used to relocate a T1 closer to the switch for connectivity?
    Smart jack
  79. Which of the following punch down blocks is BEST suited for high-speed data transmission?
    110 block
  80. Which of the following outlines the purpose of using a proxy server in an enterprise environment?
    Allows granular control over the traffic between the local LAN and the Internet
  81. Which of the following network performance optimization methods slows or restricts traffic to increase the performance of other types of traffic?
    • Traffic shaping
    • QoS
  82. Which of the following characteristics BEST describe SMF?
    • Can be used for distances exceeding 2 kilometers (1.24 miles)
    • Uses laser light for transmission
  83. Which of the following cable types allows for the maximum cable run distance?
    Single-mode fiber
  84. Which of the following data is included in a wireless access points beacon frame?
    A SSID and MAC address
  85. On a wireless network, a user is able to connect to local resources, but not to be the Internet. Which of the following is the MOST likely cause?
    The gateway is not configured on the router
  86. A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?
    Identify the symptoms and potential causes
  87. Which of the following is an advantage of 100Base-FX over 100Base-TX?
    Longer cable runs
  88. Which of the following devices allows segregation of collision domains but not broadcasting domains?
    Switch
  89. Which of the following is the function of a NIC?
    It transceives digital data
  90. A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is teh BEST to implement?
    PAT (Port Address Translation)
  91. Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?
    802.11a
  92. Which of the following protocols is used for connecting clients to a news server?
    NNTP (Network News Transfer Protocol)
  93. A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna.
    Which of the following would BEST improve the link performance?
    Replace the omni-directional antennas with Yagi antennas
  94. Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?
    CSMA/CA
  95. Users on the network can no longer access a custom application that uses TCP 8090 hosted on the DMZ. A technician has verified that the firewall is permitting the TCP port. Which of the following commands would verify the server is still accepting connections on TCP 8090?
    netstat
  96. A network technician is connecting through the console port to configure a switch. Which of the following ports would be used to transfer configuration files from the switch?
    UDP 69
  97. A user states that they have decreased signal strength on their wireless connection. They have been using the wireless network previously without problems and the network configuration has not been changed. Which of the following is MOST likely the cause of the degraded signal?
    Environmental factors
  98. After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server. This is only an intermittent problem. Which of the following actions will the technician MOST likel perform to resolve this problem?
    Check the cable ends
  99. In the OSI model, which of the following layers would be the cause of a session time-out while browsing the web?
    Layer 5
  100. Which of the following network protocols allows for automated alerts and reports on network devices?
    SNMP
  101. An employee is having issues accessing shared resources on a file server. Which of the following troubleshooting steps should the technician take FIRST?
    Identify the symptoms
  102. Which of the following port numbers does SSH use?
    22
  103. Which of the following protocols maps an IP address to a MAC address?
    ARP
  104. Which of the following is the maximum CAT5 length acceptable for a horizontal cross-connect?
    328 feet (100 meters)
  105. Which of the following is the FIRST criterion used to select from the routing table?
    Most precise matching prefix
  106. A network technician discovers that the phone company has installed the smart jack in the wrong location. It needs to be moved 75 feet (23 meters) to the computer room. Which of the following should be requested?
    A demarc extension
  107. Which of the following protocols provides teh actual encryption used over VPN?
    PPTP
  108. Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN?
    Baseline and configuration documentation
  109. Which of the following WAN technologies would a technician find dense wavelength division multiplexing (DWDM)?
    SONET
  110. Which of the following network services is responsible for mapping names to IP addresses?
    DNS
  111. QoS is used to accomplish which of the following objectives?
    Provide priority of one or more types of traffic over others
  112. Which of the following TCP connect scanners is always set for normal data flow once a connection is established?
    ACK
  113. Which of the following is required to pass traffic from one VLAN to another?
    A layer three switch
  114. Which of the following protocols are used to transfer files between two systems?
    • SCP
    • FTP
  115. Which of the following LAN connection technologies has a full duplex speed of 200Mbps and uses and CAT5e cable?
    100Base-T
  116. Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?
    SC
  117. Which of the following is the BEST reason to implement QoS when real-time applications are in use in the network?
    Prioritize delay sensitive traffic
  118. Which of the following technologies is BEST suited for a point-to-point circuit that is 6 kilometers (3.7 miles) in distance?
    10GBase-LR
  119. In a network constructed using star topology, all the devices are connecting to one central device known as the:
    hub
  120. Which of the following is the maximum segment distance of a 100Base-FX network?
    2,000 meters (6,561 feet)
  121. Which of the following protocols is the MOST susceptible to a packet sniffer?
    SNMPv2
  122. A user reports that the wireless network is slow and is able to see and access shared folders taht are unknown to the user. Which of the following is the cause of the problem?
    The user is connecting to the wrong SSID
  123. Which of the following network protocols is needed to ensure that users can type in a FQDN insteand of the IP address?
    DNS
  124. Which of the following are features of a DHCP server?
    • Dynamic IP addressing
    • Static IP address reservations
  125. The data center power will not be restored for several hours. Which of the following can be implemented in the future to allow the data center to keep running?
    Connect the data centers power to a generator
  126. Which of the following is the length of a MAC address?
    48bit
  127. Which of teh following cable types is typically used to connect a hub to a hub that does not support MDI-X?
    Crossover
  128. Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies?
    802.11n
  129. Which of the following can an application layer firewall filter that a network layer firewall cannot?
    HTTP URLs
  130. Which of the following devices would administer routing in a network?
    Multilayer switch
  131. A new segment needs to be added to a network to provide access for 64 servers. Which of teh following subnets will provide the needed access and still conserve IP addresses?
    192.168.1.30/25
  132. Which of the following protocols allows usernames and passwords to be transmitted asclear-text?
    PAP (Password authentication protocol)
  133. A user has plugged a computer into a switch port and now is unable to access any server resources on the network. Which of the following are the MOST likely reasons for the access problem?
    • The computer is connected to a port in teh wrong VLAN
    • The appropriate credentials have not been supplied for network access
  134. Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group?
    Enabling VLANs
  135. A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones?
    PoE
  136. A user has been transferred from the accounting team to the human resources team. The user can only print to the accounting teams printer and cannot print to the human resources teams printer. Which of the following is the cause of the problem?
    Wrong VLAN
  137. Which of the following are the IEEE designations for the spanning tree protocol?
    • 802.1d
    • 802.1w
  138. At which of the following layers of the OSI model would a repeater operate?
    Layer 1
  139. Which of the following commands would allow the technician to identify the currently assigned DNS server?
    nslookup
  140. To forward traffic from a host with the IP address of 10.0.0.100/25 to 10.0.0.200/25 which of the following devices will be required?
    A router
  141. Which of the following software types would BEST be used for identyfying an attack?
    IDS
  142. Which of the following types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?
    IPS
  143. Which of the following properties describes a rate at which bits are transmitted over a WAN link?
    Transmission speed
  144. Which of the following is a secure method for file transfer to a network device?
    SCP
  145. Which of the following frequency ranges does 802.11a operate at?
    5GHz
  146. A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need?
    • MPLS
    • Frame-relay
    • ATM
  147. Which of the following OSI layers handles the routing of data across segments?
    Network
  148. A client wants to extend the range of their wireless network without running wires throughout the small office. Which of the following could be implemented with the LEAST administrative effort?
    Install a WAP in the middle of the office
  149. Which of the following components in a structured wiring system supports an Ethernet network?
    110 block
  150. Which of the following protocols is used to ensure consistent time across network devices on teh domain?
    NTP
  151. Which of the following cable types has the shortest maximum cable run length?
    CAT3
  152. When would a technician use plenum-rated cable?
    When installing cable in ceilings
  153. Which of the following protocols provides a secure method to remotely administer a server?
    SSH
  154. Which of the following traffic types would a network layer firewall be unable to filter?
    Email sender verification
  155. Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?
    CSMA/CD
  156. Which of the following features from the switch eliminates a delay in acquiring an IP address?
    Enable spanning tree on the interface
  157. Which of the following cable standards has teh highest effective range at a greater expense?
    1000Base-LX
  158. How many broadcast domains are created by a 24 port switch configured with 12 VLANs with all of the ports being actively used?
    12
  159. A network device taht is used to connect multiple devices without segmenting a network is a:
    hub
  160. Which of the following is an advantage of 100Base-FX?
    Uses a more flexible cable
  161. Which of the following could be installed to improve network performance when accessing Internet websites?
    Caching engine
  162. Users are reporting that they can access Internet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem?
    The intranet server is down
  163. Which of the following LAN types would utilize CAT5 UTP?
    100Base-TX
  164. When troubleshooting a network error, a technician using a laptop as a network sniffer can see all the communications on the network segment. Which of the following network devices is the laptop plugged into?
    Hub
  165. To support roaming across a wireless 802.11g network, each access point should be configured to use which of the following?
    The same SSID
  166. A new laptop has been purchased with an 802.11n wireless card. The laptop will not connect to their existing 802.11a network. Which of the following is MOST likely the reason teh laptop will not connect?
    Standard mismatch
  167. Which of the following will allow an administrator to restrict communication between network devices?
    ACL
  168. Which of teh following is the strongest type of wireless encryption?
    AES
  169. Which of the following routing protocols is a link state and uses a backbone called area 0?
    OSPF
  170. A user contacts a technician and states taht they are unable to access the network. The technician discovers that the IP address of teh workstation is 169.123.142.34. Which of the following has occurred?
    The workstation has obtained an APIPA address
  171. The 66 block termination point is:
    CAT3 compliant
  172. The role of intelligently forwarding frames from one broadcast domain to another would be performed by which of the following network equipment?
    Router
  173. Which of the following is the maximum transmission distance of 10GBase-LR?
    6 miles (9.7 kilometers)
  174. Which of the following is teh maximum distance a 10GBase-EW connection can transmit with one repeater?
    80,000 meters (262,467 feet)
  175. Which of the following is the component in a wiring system designed to support legacy phone systems?
    66 block
  176. Remote users are having problems accessing files from a file server. Which of the following should a technician check FIRST?
    Connectivity
  177. Which of the following is a utility that translates the physical network address to its IP address?
    rarp
  178. Which of the following networks has the LEAST likelihood of collisions?
    Ring
  179. Which of the following tools would be used to establish a connection on a wall jack to connect to the desktop?
    Punch down tool
  180. Which of the following network devices filters packets based on rules that have been configured for it?
    Firewal
  181. A network technician is implementing new wireless access pionts in an existing wireless infrastructure. The security is the WPA2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?
    AES
  182. A technician is working on a new employees workstation in the accounting department. The workstation needs access to the accounting server. Currently the technician notices that the employee can only access the Internet. Which of the following would the technician need to verify?
    Connect VLAN setting
  183. Which of the following techniques would increase teh bandwidth for network ttransmission by joining together multiple connections into one logical connection?
    Bonding
  184. Which of the following protocols permits secure polling of network devices?
    SNMPv3
  185. Which of the following routing protocols uses AS-Path as one of the methods tobuild the routing table?
    BGP
  186. Ensuring that data is transmitted securely over an IP network is the main purpose of:
    TLS
  187. Which of the following network segmetns is located outside the firewall?
    DMZ
  188. A technician is troubleshooting connectivity issues on a clents machine. The technician needs to see the current NetBIOS configuration and open connections, which of teh following commands would allow this information to be displayed?
    nbstat
  189. A technician has just finished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do NEXT?
    Test if the solution works and identify other effects it may have.
  190. Which of the following address ranges should a netowrk administrator deny in teh ACL to prevetn multicast packets from crossing the WAN interface?
    224.0.0.0 - 239.255.255.255
  191. A company guest is requesting to use their personal laptop on the company wireless network. DHCP is configured correctly for wireless and a temporary WEP key is assigned. The laptop cannot connect to the network because:
    MAC filtering is enabled on the WAP
  192. An active/passive server cluster in chich only one server is active and handling requests, is an example of which of the following network performance optimization?
    high availability
  193. Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?
    arp
  194. Which of the following is teh recommended maximum distance CAT6 cable should be run?
    328 feet (100 meters)
  195. When configuring a wireless access point, which of the following principles should be used to select a channel to operate on?
    Select the channel with the frequency range least used in the given area
  196. Which of the following is the default port for HTTPS?
    443
  197. Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?
    MPLS
  198. When connecting two devices for data on a vertical cross connect, which of the following cables would be used to connect those devices?
    Fiber
  199. Which of the following authentication protocols uses certificates to negotiate access to the network?
    EAP-TLS
  200. A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to imporove convergence time?
    Replace RIP with a link state routing protocol such as OSPF
  201. A technician is setting up a public server for their company. The IP address is 19.19.0.1. Which of the following is teh default subnet mask for the server?
    255.0.0.0
  202. A user is trying to establish an FTP connection to a computer at home. The home computer is turned on and has Internet connectivity. However, they are unable to connect from the PC at work. The IP address that the user is trying to connect to is 192.168.1.125. Which of the following is the MOST likely problem?
    The IP address of the home computer is not routable across the Internet
  203. A corporate office network has 40 computers all in teh same private IP subnet. The corporate office has purchased an Internet connection from their local ISP. They were assigned one static public IP address and all 40 computers will require access to the Internet. How can this be accomplished?
    PAT will allow access to the Internet
  204. A company has one headquarters location and ten remote sites. The remote sites do not need to communicate with each other, just with headquarters. Which of the following is the BEST topology to use?
    Star
  205. Which of the following would limit the availability of the types of sites that users on a LAN have access to?
    A proxy server
  206. Which of the following BEST describes teh use of plenum cable?
    Reduces toxic gas released during a fire
  207. When using the ping utility, which switch pings a network device until stopped?
    ping-t
  208. A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?
    RIPv2
  209. Which of the following would be a correct statement about VLANs?
    VLANs help isolate network traffic
  210. A user is experiencing slow connections. Which of the following commands would be used to determine the delay time between the hops?
    tracert
  211. Which of the following protocols uses port 22 by default?
    SSH
  212. Which of the following devices can be remotely looped for troubleshooting purposes?
    A smart jack
  213. Which of the following authentication methods allows for domain level authencation on a wireless network?
    RADIUS
  214. An RJ-11 connector is capable of having up to how many pins?
    6
  215. A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?
    WPA PEAP

What would you like to do?

Home > Flashcards > Print Preview