25B Phase 2 Final Exam Pool

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When a computer assembles a frame to be sent over the network, what is the maximum size of an Ethernet frame?

1518 bytes

Which scenario describes a peer-to-peer network?

A user has shared a printer attached to the workstation.

What are two ways to protect a computer from malware?

Keep software up to date Use antivirus software

What is the difference between the terms bandwidth and throughput?

Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate.

A medium-sized company uses APs, WLCs, and laptops for employee workstations. An employee reports the inability to connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are tow possible reasons for the problem?

The wireless client is not configured for DHCP The workstation is out of range

Which three attacks exploit vulnerabilities in software? (Choose three.)

Trojan horses worms viruses

A file is downloaded form the Internet. After the user opens the downloaded file, the hard drive crashes and all information on the computer is lost. What type of attack occurred?

Virus

What is the function of ARP?

maps IPv4 addresses to MAC addresses

Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?

nslookup


Set pelajaran terkait

Exercise 13 page 44 simple past and present perfect

View Set