当前分类: N10-004
问题:单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A Logical network diagramB History logsC Baseline configurationsD Wiring schematics...
查看答案
问题:单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A MulticastB UnicastC BroadcastD Peer-to-peer...
问题:单选题Which of the following commands is used to display other computers running on the network?()A hostnameB ipconfigC net viewD nslookup...
问题:单选题Which of the following routing protocols is strictly a distance vector protocol?()A IS-ISB BGPC EIGRPD OSPF...
问题:单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos...
问题:单选题Which of the following devices transmits timed broadcasts onto an active network?()A BridgeB Unmanaged switchC DHCP clientD Firewal...
问题:单选题Keyword and blacklist filtering would be handled at which level in a network?()A Layer 2 managed switchB DHCP serverC Hardware firewallD Bridge...
问题:单选题Which of the following authenticates a web server to the remote client in PKI?()A FQDNB DNS nameC Public keyD Private key...
问题:单选题Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A IDSB VPNC NIPSD HIDS...
问题:单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78A tracertB pingC arpD netstat...
问题:单选题A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's ...
问题:单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle...
问题:多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus...
问题:单选题Which of the following wireless technologies can operate at only 5GHz?()A 802.11b/gB 802.11gC 802.11bD 802.11a...
问题:单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP...
问题:单选题Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?()A ISDNB PSTNC OC-2D T1...
问题:单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training...
问题:单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A IS-ISB BGPC OSPFD RIP...
问题:单选题A computer is able to ping other devices on the same network but is unable to ping devices onanother network. Which of the following needs to be configured?()A DNS primary serverB Host routeC Proxy ARPD Default gateway...
问题:单选题Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()A BaselinesB RegulationsC Logical network diagramsD Wiring schematics...