Chapters 1-4 Quiz Questions Network+

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network administrator enters the command "show mac address-table" into the command prompt. What information will the network administrator get in return? (Select two) a. Interface Port b. MAC Address c. IP Address d. Subnet Mask

a. Interface Port b. MAC Address

Spanning Tree Protocol (STP) is used to prevent what? a. Switching Loops b. Attenuation c. Noise d. Port Mirroring

a. Switching Loops

Which of the following are valid IPv6 addresses? (Choose TWO) a. fdb:cdef::1:80:5e6a::9a25 b. 2001:db8::abc:0:def0:1234 c. 2001:dg7::abh:0:def0:1234 d. fdab:cdef:0:1:8f0:5e6a:2f0f:9a25

b. 2001:db8::abc:0:def0:1234 d. fdab:cdef:0:1:8f0:5e6a:2f0f:9a25

How many bits are in an IPv4 address? a. 64 b. 32 c. 48 d. 24

b. 32

PNAC means that the switch (or How many usable IP addresses can be assigned to hosts on a /26 subnet? a. 30 b. 62 c. 126 d. 254

b. 62

Differentiate between the characteristics of a Local Area Network (LAN) and a Wide Area Network (WAN). a. A WAN is a network with one geographic location while a LAN is spread across multiple geographic locations with shared links. b. A LAN is a network with one geographic location while a WAN is spread across multiple geographic locations with shared links. A LAN is limited in size and typically has less than 1000 nodes while a WAN is unlimited in size. A WAN is limited in size and typically has less than 1000 nodes while a LAN is unlimited in size.

b. A LAN is a network with one geographic location while a WAN is spread across multiple geographic locations with shared links.

At which OSI layer do programs access network services? a. Physical b. Application c. Session d. Network

b. Application

The TCP/IP model condenses which of the following OSI layers to create the Application layer? (Choose 3) a. Data Link b. Application Transport c. Presentation d. Session

b. Application Transport c. Presentation d. Session

What is the last address in any IP network called? a. Network Address b. Broadcast Address c. Gateway Address d. Routing Address

b. Broadcast Address

Two computers send a signal down a cable at the same time. One node broadcasts a jam signal and one node waits for three seconds while the second node waits five seconds to resend the transmit. This is an example of which of the following Carrier Sense Multiple Access (CSMA) protocols? a. Collision Avoidance b. Collision Detection c. Carrier Sense d. Multiple Access

b. Collision Detection

In DHCP, what are the IP addresses that a DHCP server is configured with and can assign to clients? a. DHCP Server b. DHCP Pool c. DHCP Reservation d. DHCP Discover

b. DHCP Pool

A network administrator implements traffic policies for routing boundaries, filtering, and quality of service. Which layer of the network hierarchy will perform this function? a. Data Center b. Distribution c. Access d. Core

b. Distribution

Which of the following statements accurately describes Internet Protocol (IP)? a. Internet Protocol (IP) works at the Data layer. b. Internet Protocol (IP) is connectionless. c. Internet Protocol (IP) is reliable. d. Internet Protocol (IP) provides guaranteed delivery.

b. Internet Protocol (IP) is connectionless.

If an IP datagram larger than 1500 bytes is sent over a network, what will happen? a. It will be fragmented across more than one Ethernet frame. b. It will be dropped due to its excess size. c. It will be sent only after a request for larger transmissions was sent and received by the destination host. d. It will be transmitted via WiFi only.

a. It will be fragmented across more than one Ethernet frame.

In order to successfully transmit a frame with a payload size of 1518 bytes or greater over a bounded ethernet medium without fragmentation, what must be used? a. Jumbo Frames b. MTU c. Coaxial Cable d. Gigabit Ethernet

a. Jumbo Frames

Which of the following devices are part of Layer 2 of the OSI model? (Select two) a. Network Interface Card b. Bridge c. Hub d. Modem

a. Network Interface Card b. Bridge

A network manager is configuring a firewall. Prepare guidelines for the network manager to follow. (Select two) a. Only allow the minimum amount of traffic required. b. The most important rules are placed at the top. c. The rules are processed from bottom to top. d. The final default rule in a firewall is implicit allow.

a. Only allow the minimum amount of traffic required. b. The most important rules are placed at the top.

What is the slash notation for subnet mask 255.255.255.128? a. /24 b. /20 c. /25 d. /22

c. /25

Which of the following represents a valid 48-bit MAC address? a. ac:79:h6:42:e2:08 b. ac:79:d6:42:b2:08 c. 00608ca23abc d. 0060.8c12.3aoc

c. 00608ca23abc

Using the xBASE-y ethernet standard naming convention, what would be some characteristics of a 10GBASE-LR cable? (Select TWO) a. Coaxial Cable b. Plenum Cable c. 10 Gigabit Ethernet d. Fiber Optic Cable e. 10 Megabit Ethernet f. Twisted Pair

c. 10 Gigabit Ethernet d. Fiber Optic Cable

Which of the following protocols resides at the Application layer of the OSI model? a. UDP b. IP c. HTTPS d. TCP

c. HTTPS

What uses the same technologies as the Internet, but it is owned and managed by a company or organization? a. Mesh b. Wireless network c. Intranet d. Extranet

c. Intranet

What is the purpose of Layer 4 of the OSI model? a. It routes data across network segments. b. It initiates a session between nodes on different network segments. c. It regulates data transfer using TCP or UDP. d. It sends bits across a physical or wireless medium.

c. It regulates data transfer using TCP or UDP.

At which layer of the OSI model does IP addressing take place? a. Layer 5 b. Layer 2 c. Layer 3 d. Layer 4

c. Layer 3

What is the term for switches with the ability to route traffic efficiently between VLANs? a. Aggregation switch b. Unmanaged switch c. Layer 3 switch d. Root Switch

c. Layer 3 switch

What layer of the OSI model does not add a header to the data payload? a. Transport b. Application c. Physical d. Network

c. Physical

Host A tries to establish a connection on a local network to Host B and first sends an ARP request. Why does Host A need to send an ARP request? a. To discover the hardware address of Host B b. To inform Host B of Host A's IP address c. To discover the logical address of Host B. d. To resolve Host B's name to an IP address

a. To discover the hardware address of Host B

Which device is high performing and deploys to combine links in a large enterprise or service provider's routing infrastructure? a. Top-of-Rack (ToR) switches b. Aggregation switches c. Routers d. Layer 3 switches

b. Aggregation switches

Which of the following is an example of unbounded media? a. Coaxial Cable b. Fiber Optic c. Copper Cable d. Microwave radio

d. Microwave radio

True or False: When two 1s are ANDed together, the result is a 0. Any other combination produces a 1, except for two 0s.

False

True or False? The IP address 192.168.32.1 is routable over the Internet

False

True or false: If you have a workstation that cannot connect to a server, tracert is the first test you should perform to establish whether the cabling is OK.

False

What are the four steps of the DHCP leasing process?

Step 1 Discover Step 2 Offer Step 3 Request Step 4 Ack

True or False? The IEEE 802.11 standard represents unbounded media (wireless), while the IEEE 802.3 standard represents bounded media (wired).

True

True or false: All the nodes shown in the following figure are in the same collision domain.

True

True or false: Any type of node that connects multiple devices over multiple ports, including hubs, bridges, switches, and routers can be used in implementing a physical star topology.

True

True or false: If a managed switch is left unconfigured, it functions the same as an unmanaged switch does.

True

True or false: VLSM means using more than one mask to subnet an IP network.

True

Which of the following answers lists the CIDR notation for 255.255.224.0 subnet mask? a. /19 b. /21 c. /20 d. /18

a. /19

What is the default subnet mask for Class C addresses? a. 255.255.255.0 b. 255.0.0.0 c. 255.255.0.0 d. 255.255.225.255

a. 255.255.255.0

Analyze the process of subnetting. Determine why an administrator may find subnetting beneficial for a network. (Select two) a. A network has a large number of hosts on the same Internet Protocol (IP) network. b. A network uses the same physical and data link technologies throughout. c. An organization has one Local Area Network (LAN) without a Wide Area Network (WAN). d. To divide a network into logically distinct zones for security.

a. A network has a large number of hosts on the same Internet Protocol (IP) network. d. To divide a network into logically distinct zones for security.

Consider the features of Protocol Data Units (PDUs) and determine what role encapsulation performs during communications. a. Describes how data should be packaged. b. Enables communication between nodes at the same layer. c. Enables systems to communicate by exchanging data. d. Describes where data should go.

a. Describes how data should be packaged.

Which of the following are valid ICMP message types? (Choose three) a. Destination unreachable b. Unable to proceed c. Time exceeded d. Uptime e. Echo request/reply

a. Destination unreachable c. Time exceeded

What is fragmentation? a. Dividing the contents of large messages into smaller packets for delivery over an internetwork. b. Using alternative paths to ensure packet delivery. c. Segmenting networks with a layer 2 or 3 switch. d. Hardware and software involved in the interchange of frames between hosts.

a. Dividing the contents of large messages into smaller packets for delivery over an internetwork.

STP is installed on switch A, which has two ports connected to other switches. One of the ports is directly connected to the root bridge and functions as normal, which of the following states BEST describes this port? a. Forwarding b. Listening c. Blocking d. Learning

a. Forwarding

Host A and Host B are on the same local network. Host A sends a communication to Host B. Determine the order of actions taken by local address resolution and select the second step that will occur. a. If the Media Access Control (MAC) address is not present in cache, Address Resolution Protocol (ARP) will build a request and broadcast it onto the network. b. Host A checks its Address Resolution Protocol (ARP) table cache for the required hardware address of Host B. c. If Host B recognizes its own address, it updates its cache with the Media Access Control (MAC) address of Host B and then replies to Host A d. Host A receives a reply, updates its cache table, and establishes communication.

a. If the Media Access Control (MAC) address is not present in cache, Address Resolution Protocol (ARP) will build a request and broadcast it onto the network.

Summarize the functions of the Link layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack. a. The Link layer defines the host's connection to the network media and includes the hardware and software involved in the interchange of frames between hosts. b. The Link layer establishes connections between the different applications that the source and destination hosts use to communicate. c. The Link layer is where many of the high level protocols can be run, such as File Transfer Protocol (FTP). d. The Link layer provides addressing and routing functions along with the ability to fragment large frames from the Network Interface layer into smaller packets.

a. The Link layer defines the host's connection to the network media and includes the hardware and software involved in the interchange of frames between hosts.

A system administrator enters ipconfig /all into a command prompt. What will be a result of this action? a. The command will allow the administrator to confirm if the Dynamic Host Configuration Protocol (DHCP) is enabled. b. The command will register the host with a Domain Name System (DNS) server. c. The command will release the Internet Protocol (IP) address obtained by the Dynamic Host Configuration Protocol (DHCP). d. The command will force a Dynamic Host Configuration Protocol (DHCP) to renew the lease.

a. The command will allow the administrator to confirm if the Dynamic Host Configuration Protocol (DHCP) is enabled. The command will register the host with a Domain Name System (DNS) server.

A host has an address of 169.254.101.201. What can an administrator infer from this address? a. The host did not receive a response to a DHCPDISCOVER broadcast. b. The address is leased and the host must release the Internet Protocol (IP) after a specific period of time. c. The network mask is 255.255.255.0. d. The host is configured with a static Internet Protocol (IP) address.

a. The host did not receive a response to a DHCPDISCOVER broadcast.

Summarize the role of Layer 6 in the Open System Interconnection (OSI) model. a. Transforms data between the format required for the network and the format required for the application. b. Moves data around an internetwork using logical network and host IDs. c. Administers the process of establishing the dialog, managing data transfer, and then ending the session. d. Provides an interface for software programs on network hosts that have established a communications channel.

a. Transforms data between the format required for the network and the format required for the application.

What is the significance of the IP address 255.255.255.255? a. Used to broadcast to the local network when the local network address is not known. b. Set aside for a variety of special purposes. c. Used by hosts for automatic private IP addressing (APIPA or link-local addressing). d. Set aside for use in documentation and examples.

a. Used to broadcast to the local network when the local network address is not known.

What command can be configured on Cisco routers to allow set types of broadcast traffic (including DHCP) to be forwarded to an interface? a. ip helper b. dhcp helper c. ip d. ipconfig /all

a. ip helper

Compare the Open System Interconnection (OSI) model and the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack and determine which statements accurately distinguish between the two. (Select two). a. The OSI model consists of 4 layers compared to the 7 layers found in the TCP/IP protocol stack. b. PPP, PPTP, and L2TP occur at the Link layer of the TCP/IP protocol stack and occur at Layer 2 of the OSI model. c. The Application layer of TCP/IP consolidates Layers 5-7 of the OSI model. d. TCP and UDP occur at the Internet layer of the TCP/IP protocol stack.

b. PPP, PPTP, and L2TP occur at the Link layer of the TCP/IP protocol stack and occur at Layer 2 of the OSI model. c. The Application layer of TCP/IP consolidates Layers 5-7 of the OSI model.

A network is designed for several connected machines to share the bandwidth of a single media. The machines must compete to use media, as each machine is directly attached to a single cable. What type of topology does this demonstrate? a. Point-to-point b. Physical bus c. Ring d. Physical Mesh

b. Physical bus

Which of the following allows you to inspect the traffic passing through a network switch? a. Loop-back Interface b. Port mirroring c. Frame Relay d. Switching Loops.

b. Port mirroring

Which are the last (top) two layers of the OSI model? (Select 2) a. Physical b. Presentation c. Application d. Data Link

b. Presentation c. Application

The OSI model consists of how many layers? a. Four Layers b. Seven Layers c. Two Layers d. Five Layers

b. Seven Layers

A new department has been added to your company. You now need to extend the distance of the network and segment the new department. What network device will accomplish this? a. Hub b. Switch c. Crossover cable d. Wireless Repeater

b. Switch

A frame with a payload of 32 bytes is attempting to transmit over an Ethernet network. Decide what will occur. a. The payload will fail to transmit based on minimum size. b. The payload will receive extra padding with redundant data to increase the size. c. The payload will experience a reduction in size due to being over the maximum size. d. The payload will transmit due to being under the maximum size.

b. The payload will receive extra padding with redundant data to increase the size.

Which of the following BEST describes the differences between VLAN hopping and session hijacking? a. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection b. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user's web connection to execute commands c. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges d. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation

b. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user's web connection to execute commands

A network administrator suspects an issue with local addressing. The administrator would like to view the entries of the Address Resolution Protocol (ARP) table. Recommend the appropriate ARP utility command. a. arp -a b. arp -s c. arp -d d. arp -n

b. arp -s

Each port on a switch is a separate collision domain and effectively, the switch establishes a point-to-point link between any two connected nodes. This is referred to as ________________. a. auto-negotiation b. microsegmentation c. port mirroring d. flooding

b. microsegmentation

What is typically automatically configured as the default loopback address on every IP host? a. 127.0.1.0 b. 127.1.0.0 c. 127.0.0.1 d. 127.0.0.255

c. 127.0.0.1

A network administrator is deploying a mesh network topology. The network has 10 nodes. Calculate the number of links required for this deployment. a. 25 b. 90 c. 45 d. 100

c. 45

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of: a. Amplified DNS Attack b. Evil Twin c. ARP Cache Poisoning d. IP Spoofing

c. ARP Cache Poisoning

The loss of signal strength, expressed in decibels (dB), is called what? a. Jitter b. Noise c. Attenuation d. Broadcasting

c. Attenuation

What is the data unit used at the OSI physical layer? a. Packet b. Segment c. Bit d. Frame

c. Bit

Two nodes are communicating over a fiber optic cable connection. Evaluate the types of transmission media and determine which of the following the two nodes are using to conduct their communication. a. Unbounded media b. Line coding c. Bounded media d. Wireless

c. Bounded media

A host has an Internet Protocol (IP) address of 129.153.138.83. Evaluate classful addressing standards and determine the class of the host's network. a. Class A b. Class D c. Class B d. Class C

c. Class B

What class of IP addresses is reserved for experimental use and testing? a. Class D b. Class C c. Class E d. Class B

c. Class E

A ___________ is a service that captures a BOOTP or DHCP broadcast and forwards it through the router as a unicast transmission to the DHCP server on another subnet. a. DHCP Routing b. DHCP Forwarding c. DHCP Relay Agent d. DHCP Discover

c. DHCP Relay Agent

Compare the features of reserved address ranges and determine the purpose of Internet Protocol (IP) address 169.254.0.0. a. It is set aside for use in documentation and examples. b. Hosts use it to broadcast to the local network. c. Clients use it as a source address for a Dynamic Host Configuration Protocol (DHCP) lease. d. Hosts use it for automatic private addressing.

d. Hosts use it for automatic private addressing.

Differentiate between the characteristics of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). (Select TWO) a. Internet Protocol version 6 (IPv6) is a 32-bit addressing scheme while Internet Protocol version 4 (IPv4) is a 128-bit addressing scheme. b. Internet Protocol version 6 (IPv6) and Internet Protocol version 4 (IPv4) both only use values 0-9. c. Internet Protocol version 6 (IPv6) is a 128-bit addressing scheme while Internet Protocol version 4 (IPv4) is a 32-bit addressing scheme. d. Internet Protocol version 6 (IPv6) uses hexadecimal numbering while Internet Protocol version 4 (IPv4) uses decimal numbering.

c. Internet Protocol version 6 (IPv6) is a 128-bit addressing scheme while Internet Protocol version 4 (IPv4) is a 32-bit addressing scheme. d. Internet Protocol version 6 (IPv6) uses hexadecimal numbering while Internet Protocol version 4 (IPv4) uses decimal numbering.

A host has an Internet Protocol (IP) address of 172.20.152.104. What information does this IP address provide? (Select two) a. It's a public address. b. It's a Class C address. c. It's a Class B address. d. It's a private address.

c. It's a Class B address. d. It's a private address.

The __________ field describes what is encapsulated in the payload so that the receiving host knows how to process it. a. Diffserv b. Fragment offset c. Protocol d. TTL

c. Protocol

Which of the following devices is used to extend the signal strength on a network segment but does not make decisions on traffic flow? a. Transceiver b. Router c. Repeater d. Bridge

c. Repeater

What is the term for the mapping of a MAC address to a specific IP address within the DHCP server's address pool so that when the DHCP server receives a request from the given MAC address, it always provides the same IP address? a. Dynamic allocation b. Registration c. Reservation d. Snooping

c. Reservation

A network consists of four host computers and a single switch that each computer directly connects to. What is the physical topology of the network? a. Bus b. Mesh c. Star d. Ring

c. Star

Analyze network authentication When all parameters required by TCP/IP are configured manually, this is referred to as? a. Reservation IP Addressing b. Dynamic IP Addressing c. Static IP Addressing d. DHCP

c. Static IP Addressing

What allows a network designer to allocate ranges of IP addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet more closely? a. Segmentation b. Classless Inter-Domain Routing (CIDR) c. Variable Length Subnet Masking (VLSM) d. Reserved address ranges

c. Variable Length Subnet Masking (VLSM)

What ipconfig commands are used for discarding an IPv4 address or renewing a lease from the DHCP client? (Choose TWO) a. ipconfig /all b. ipconfig /reset c. ipconfig /renew d. ipconfig /release

c. ipconfig /renew d. ipconfig /release

When operating in a Linux-based environment, what command-line tool could be used for packet sniffing to capture unicast frames on an ethernet LAN? a. protocol analyzer b. arp -d c. tcpdump d. netstat

c. tcpdump

Convert the decimal value 210 into binary. a. 11100000 b. 10110010 c. 1010100 d. 11010010

d. 11010010

Which of the following answers lists the broadcast address for the 192.168.50.155 /26 network? a. 192.168.50.255 b. 192.168.50.63 c. 192.168.50.155 d. 192.168.50.191

d. 192.168.50.191

A WAN describes which of the following network topologies? a. A small network of devices connected wirelessly through bluetooth. b. A wireless enterprise network used for large corporate environments. c. A local network of IoT's that are connected by a wireless router. d. A Network that spans more than one geographical location.

d. A Network that spans more than one geographical location.

What mechanism was developed as a means of supplying a full set of configuration parameters to a host while still relying on a static configuration file mapping IP addresses to MAC addresses? a. Dynamic allocation b. MAC address table c. Reverse ARP (RARP) d. Bootstrap Protocol (BOOTP)

d. Bootstrap Protocol (BOOTP)

Which of the following is a device found at the Physical layer of the OSI model? a. Bridge b. Switch c. Router d. Hub

d. Hub

Evaluate the characteristics of the preamble of the Ethernet frame format and determine which of the following are features of the preamble. a. Is used for clock synchronization and consists of 8 bytes with two consecutive 1's at the end b. Is a part of the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) protocol and is the first step in the Ethernet frame format c. Is used for clock synchronization and consists of 8 bytes with two consecutive 3's at the end d. Is a part of the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) protocol and is the first step in the Ethernet frame format.

d. Is a part of the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) protocol and is the first step in the Ethernet frame format.

A small business owner has a home office that consists of two computers and two printers. The network uses one router for connectivity. Which type of network does this scenario illustrate? a. Campus Local Area Network b. Personal Area Network (PAN) c. Wide Area Network (WAN) d. Local Area Network (LAN)

d. Local Area Network (LAN)

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario? a. MAC Spoofing b. VLAN Hopping c. Session Hijacking d. Man-in-the-Middle e. Bluesnarfing

d. Man-in-the-Middle

What two pieces of information does an IP address provide? a. Forwarding ID and Receiving ID b. Domain ID and DHCP ID c. Network ID and Routing ID d. Network ID and Host ID

d. Network ID and Host ID

A packet is being sent from Network 1 to Network 4. The shortest route is for the packet to use the path 1234. A router fails at Network 3 and the packet uses an alternate path of 1254. This scenario depicts the application of which of the following technology? a. Circuit-switched path b. Circuit c. Fragmentation d. Packet switching

d. Packet switching

What describes the layout of nodes and links as established by the transmission media? a. Physical bus b. Point-to-point c. Logical Topology d. Physical Topology

d. Physical Topology

In a standard ethernet frame format, the Start Frame Delimiter (SFD) signifies the end of the ___________ and the transmission of the actual data begins. a. Destination MAC Address b. Header c. Source MAC Address d. Preamble

d. Preamble

Spanning tree is a means for the bridges to organize themselves into a hierarchy. The bridge at the top of the hierarchy is called what? a. Primary b. Managed c. Spanning Tree d. Root

d. Root

The trait of being able to add additional users or devices to the network without having to significantly re-design or re-engineer the existing infrastructure is referred to as? a. Flexibility b. Adaptability c. Availability d. Scalability

d. Scalability

Which of the following devices is used to create a separate layer 2 broadcast domain or VLAN, allowing network technicians to segment a network? a. Hub b. Router c. NIC d. Switch

d. Switch

What does the following unsuccessful ping message mean: Destination host unreachable? a. The host is unavailable or cannot route a reply to your computer. b. You have pinged the loopback address. c. The destination host is shut down. d. There is no routing information for that host.

d. There is no routing information for that host.

The number of seconds a packet can stay on the network before being discarded is referred to as? a. Encapsulating Security Payload (ESP/50) b. Diffserv c. Generic Routing Encapsulation (GRE/47) d. Time to Live (TTL)

d. Time to Live (TTL)

If you cannot ping the loopback address, the protocol ________. a. may not be communicating to the default gateway parameter on the local host b. may be experiencing a name resolution problem c. might have encountered a configuration error, or the network adapter or adapter driver could be faulty d. is not correctly installed on the local system

d. is not correctly installed on the local system


Set pelajaran terkait

Teaching Reading: Elementary (5205)

View Set

EAQ #6 Transient Ischemic Attack (TIA) and Stroke & Neuro and M/S

View Set

Lecture 13: Microevolution: Population genetics and speciation (Major Concepts)

View Set

Principles of Business: Chapter 18

View Set

economics : saving and borrowing

View Set

Ch. 16: Program Management, Chapter 16: Program Management, NURS 450 - Ch. 21

View Set