问题:单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A IS-ISB BGPC OSPFD RIP...
查看答案
问题:单选题Which of the following wireless technologies can operate at only 5GHz?()A 802.11b/gB 802.11gC 802.11bD 802.11a...
问题:单选题A zone transfer occurs over which of the following ports?()A TCP 53B UDP 67C UDP 123D TCP 25...
问题:单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A MulticastB UnicastC BroadcastD Peer-to-peer...
问题:单选题Which of the following allows a technician to mask a private network of IP addresses behind onepublic IP address?()A NATB SubnettingC DHCPD DNS...
问题:单选题Keyword and blacklist filtering would be handled at which level in a network?()A Layer 2 managed switchB DHCP serverC Hardware firewallD Bridge...
问题:单选题Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A SwitchB RepeaterC HubD WAP...
问题:单选题Which of the following authenticates a web server to the remote client in PKI?()A FQDNB DNS nameC Public keyD Private key...
问题:单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle...
问题:单选题Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A HubB VLANC RouterD Server...
问题:单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP...
问题:单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A PhysicalB LogicalC SoftwareD Authentication...
问题:单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos...
问题:单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78A tracertB pingC arpD netstat...
问题:单选题Which of the following security threats involves making phone calls?()A PhishingB VishingC DDoSD Xmas attack...
问题:单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A Logical network diagramB History logsC Baseline configurationsD Wiring schematics...
问题:多选题Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()AtracerouteBipconfigCifconfigDrouteEhostname...
问题:单选题Which of the following devices is used to connect a WAN to a LAN?()A Basic routerB Basic switchC BridgeD Repeater...
问题:单选题Which of the following utilities can be used to list the routing table?()A ipconficjB nslookupC netstatD dig...
问题:单选题Which of the following wireless standards has the highest maximum data rate?()A 802.11nB 802.11bC 802.11aD 802.11g...