web analytics

Your friend wants to protect the internal network from intrusion. What should you do?

You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do? A.

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. To set lower security settings in Internet Explorer for an extranet site, add the site’s

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. To set lower security settings in Internet Explorer for an extranet site, add the site’s

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. In a wireless network that requires an SSL certificate, “WEP” handles the SSL certificate. Select

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. In a wireless network that requires an SSL certificate, “WEP” handles the SSL certificate. Select

Which of these is a public address space?

Which of these is a public address space? A. 192.168.0.0/16 B. 197.16.0.0/12 C. 10.0.0.0/8 D. 172.16.0.0/12 Answer: B

Which address indicates that your router's DHCP service is NOT functioning?

Your home computer is having problems accessing the Internet. You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP address. Which address indicates

Which address indicates that your router’s DHCP service is NOT functioning?

Your home computer is having problems accessing the Internet. You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP address. Which address indicates

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples

What are three characteristics of Ethernet network topology? (Choose three.)

What are three characteristics of Ethernet network topology? (Choose three.) A. It uses tokens to avoid collisions on the network. B. It can use coaxial, twisted pair, and fiber optic

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.) A. Failure of a central connectivity device does not bring down

Which two TCP ports should you add exceptions for on the firewall? (Choose two.)

An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on

Which wireless communication problem is caused by electromagnetic waves?

Which wireless communication problem is caused by electromagnetic waves? A. Fading B. Attenuation C. Interference D. Diffraction Answer: C

What is an example of a network device that associates a network address with a port?

What is an example of a network device that associates a network address with a port? A. Switch B. Router C. Hub D. DSL modem Answer: B

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct

This question requires that you evaluate the underlined text to determine if it is correct. “WEP” wireless encryption is the most susceptible to interception and decryption. Select the correct answer

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct

This question requires that you evaluate the underlined text to determine if it is correct. “WEP” wireless encryption is the most susceptible to interception and decryption. Select the correct answer

The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. Every router today is “TCP/IP” enabled, which is an industry-standard protocol that you use on

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. Every router today is “TCP/IP” enabled, which is an industry-standard protocol that you use on

For which two reasons should you use IPsec between computers? (Choose two.)

For which two reasons should you use IPsec between computers? (Choose two.) A. Data compression B. Data integrity C. Data redundancy D. Data confidentiality Answer: BD

What are three advantages of VLANs? (Choose three.)

What are three advantages of VLANs? (Choose three.) A. They can logically address packets by using IP. B. They require a router to connect to VLANs on another switch. C.

Which feature of Category 5e STP cable reduces external interference?

Which feature of Category 5e STP cable reduces external interference? A. Crosstalk B. Shielding C. Length D. Twisting Answer: D

What is the bit rate for a North American T3 circuit?

What is the bit rate for a North American T3 circuit? A. 6.312 Mbit/s B. 44.736 Mbit/s C. 274.176 Mbit/s D. 400.352 Mbit/s Answer: B

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n Answer: D

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is “127.0.0.1”. Select the correct answer if the underlined

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is “127.0.0.1”. Select the correct answer if the underlined

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. “A/anvirtual private network (VPN)” protects a network’s perimeter by monitoring traffic as it enters and

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. “A/anvirtual private network (VPN)” protects a network’s perimeter by monitoring traffic as it enters and

A node within a local area network (LAN) must have which two of the following? (Choose two.)

A node within a local area network (LAN) must have which two of the following? (Choose two.) A. Username and password B. Share name C. NIC D. IP address E.

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. When a client computer is unable to reach a DHCP server, it will automatically assign

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. When a client computer is unable to reach a DHCP server, it will automatically assign

You need to open up ports on your firewall so your friends can join the network. Which command displays the ports that your computer is listening for?

You are setting up a network computer game. You need to open up ports on your firewall so your friends can join the network. Which command displays the ports that

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. A “secondary zone” is the first DNS zone to which all updates for the records

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. A “secondary zone” is the first DNS zone to which all updates for the records

Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action?

Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action? A. VPN B. Remote Desktop C. DirectAccess D. Nap Answer: C

What are two characteristics of fiber optic cable? (Choose two.)

What are two characteristics of fiber optic cable? (Choose two.) A. Conducts electricity B. Requires metal conduit C. Supports splicing D. Requires a polish for end connectors Answer: CD

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.) A. Network Policy and Access Services B.

You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.)

You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: A public facing web server

A university has network links between various locations. Where would a T3 connection be appropriate?

A university has network links between various locations. Where would a T3 connection be appropriate? A. Server to network in the main campus server room B. Main campus to a

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. The four IEEE standards, 802.11a, b, g, and n, are collectively known as “mobile ad

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. The four IEEE standards, 802.11a, b, g, and n, are collectively known as “mobile ad

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. IPv4 multicast addresses range from “192.168.0.0 to 192.168.255.255”. Select the correct answer if the underlined

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. IPv4 multicast addresses range from “192.168.0.0 to 192.168.255.255”. Select the correct answer if the underlined

Which protocol is a transport layer protocol?

Which protocol is a transport layer protocol? A. FTP B. IP C. UDP D. ASCII Answer: C

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. All session data is “encrypted between all machines” while using telnet. Select the correct answer

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

This question requires that you evaluate the underlined text to determine if it is correct. All session data is “encrypted between all machines” while using telnet. Select the correct answer

Which DNS record type specifies the host that is the authority for a given domain?

Which DNS record type specifies the host that is the authority for a given domain? A. NS B. MX C. CNAME D. SOA Answer: D

This question requires that you evaluate the underlined text to determine if it is correct.

This question requires that you evaluate the underlined text to determine if it is correct. The process of replicating a zone file to multiple DNS servers is called “zone replication”.

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.) A. Establishing network speed parameters B. Verifying the client’s patch level C. Negotiating algorithms to use D. Exchanging