27-37

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)

POP DNS

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

interference. security. coverage area.

What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.)

Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic provides higher data capacity but is more expensive than copper cabling.

.Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?

Layer 2 destination address = 00-00-0c-94-36-AB

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

The administrator must first enter privileged EXEC mode before issuing the command.

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

authorization

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

worm


Set pelajaran terkait

He 224 Chapter 25 Structure and Function of the Cardiovascular SystemThe

View Set

Chapter 14 Host Defense I: learning outcomes

View Set

MOC EXAM Questions for Child Neurology From Practice Test 1

View Set

Florida statutes, rules, and regulations (all lines)

View Set

MICROECON: CHAPTER 12 "LABOR MARKET"

View Set