IT NETWORK TECH

Ace your homework & exams now with Quizwiz!

Which series of Windows commands would an administrator use to reset the TCP/IP configuration of a system to ensure the system changes its configuration for a new DHCP server?

"ipconfig /release," then "ipconfig /renew"

Which of the following is an example of private Class A IP address?

10.4.0.1

Which of the following is the recommended distance limit for CAT 5 cabling in Ethernet service?

100 meters (328 feet)

Which of the following is the recommended distance limit for CAT 5 cabling in Ethernet service?

100 meters 328FT

A network tech must connect to a computer in a heavy industrial environment. The computer is located 260 meters (853 feet) away from the IDF. Which LAN technology would be the best choice?

100BaseFX

Certain IP addresses are not supposed to exist on the public internet. Which block of IP addresses would most likely be prevented from crossing a border router?

172.16.0.0/12

FTP uses ports __________ and __________ for transferring data and control signals. (Select two)

20,21

Which of the following is an example of an IPv4 address?

20.168.4.13

Which of the following ports are most commonly used by communications applications to interactively manage network devices

22,23

HTTPS requires you to open which additional port in your firewall?

443

A Class B block assignment allows for how many hosts?

65534

You are going to visit the http://www.totalsem.com website. Which TCP port number will your web browser use to complete the request?

80

Employees have been bringing in WAs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening?

802.1x

What is the loopback address for IPv6? (Select two)

::1 0:0:0:0:0:0:0:1

Sherman has configured his network hosts to use DHCP. Now, he wants to ensure that his users can use names such as www.totalsem.com instead of IP addresses when using their web browsers. He needs to install what kind of server?

A DNS server

Which is the best description of a VLAN?

A group of ports that behaves as an independent switch

Marsha wants to place certain restrictions on communication between client computers and the main file server. Which of the following will enable her to accomplish her goal?

ACL

What can a network administrator configure to control specific IP addresses and ports access to the internal network? (Select Two)

ACLs Firewall

A computer has an IP address of 169.254.1.89. Which service would have issued this assignment?

APIPA

Where would a patch antenna for 802.11 usually be placed?

Against a wall

A company has recently installed a network firewall. Users need to access a POP3 server to send and receive their email. What must the network technician configure on the firewall to allow access to the email server? (Select Two)

Allow TCP port 25Allow TCP port 110

You want to go implement Wi-Fi in your office. What device do you need to connect your clients to the network?

An access point

What is the term for the scenario where packets take one path to a destination, but the response packet takes a different path?

Asymmetric routing

Every 100 ms, a frame is sent out on a wireless network. This frame contains important information about your wireless network, such as your SSID and your bandwidth speed. What is this frame called?

Beacon

Which two of the following should you do first when you are designing and implementing a new network? (Select Two)

Begin documentation on your system and networkDetermine the company's network needs and expectations

What does a network technician need to know to select the correct type of punch down tool?

Block type

The link lights on the front of your network switch are an example of which of the following principles of Ethernet?

CARRIER SENSE

Rebecca needs to spec the equipment for the installation of a complete network system: cables, switches, PCs, etc. The network only needs to be 100BaseT but must be easy to upgrade to 1000BaseT in the future. Which one of the following, although good to have, would be the least important element for Rebecca to buy now?

CAT5e patch panel

Cassius Smith is complaining about someone getting into his system. As the network administrator, you tell Cassius Smith to set his password to something secure. Which of the following would be the most secure password for Cassius?

CS654soup

Which of the following is the most common type of WAN connection used in homes?

Cable Modem

Network technician Angelina needs to make and customize some different long and short cables. She then needs to verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select Two)

Cable certifierCrimper

Before an Ethernet NIC may transmit data onto a medium, it must check to see if another NIC is transmitting data. What is this checking process called?

Carrier sense

A user is using a PKI authentication method. Which of the following will the user need to implement PKI?

Certificate services

A user is using a PKI authentication method. Which of the following will the user need to implement PKI?

Certificates services

A view of performance metrics show that your server has been running at high temperatures. What is something that can indicate and notify you of this?

Chassis sensor

Which would be the most effective solution when disaster planning?

Cloud Site

Which would be the most effective solution when disaster planning?

Cloud site

Which type of backup data contains customized settings for a router or switch?

Configuration

What elements would be found in a change request? (Select three.)

Configuration procedures Rollback process Notification

Which would be the best example of an on-path attack?

Connecting a laptop to an access point to sniff packets and intercept them

Network administrator Kwan suspects that one of the copper network cables is faulty. When examining the suspect cable, Kwan notices that some of the pairs are untwisted too much. This is most likely causing which of the following?

Cross-talk

What would you use to create a direct connection between two client 10/100 network workstations?

Crossover Cable

Elsa needs to connect two switches together with no MDIX ports. Which of the following might she use? Your

Crossover cable

The IT department wants all workstations to have a 168.254.1.0/24 address, and it wants the addresses to be automatically assigned. Which technique will accomplish this?

DHCP addressing

At what layer of the OSI model does a bridge handle frames

Data Link

Switches operate at the __________ Layer in the OSI model.

Data Link

Margaery is a user who is experiencing very slow network access. She has spoken with other users and learned that no one else is having the same issue. Which of the following is the next step in troubleshooting this issue?

Determine if anything has changed

Which options represent recommended approaches to troubleshooting? (Select Three)

Divide and conquerTop-to-bottom of the OSI ModelBottom-to-top of the OSI Model

What kind of malicious attack creates a buffer overflow to prevent regular users from accessing a system?

DoS

Which of the following is a benefit of fault tolerance?

Elimination of a single point of failure

Manette is a network technician who needs to monitor remote traffic through an access point. Which of the following will she need to do?

Enable an SNMP agent

Theo must send highly sensitive data over his PPTP connection. What feature of PPTP will give him confidence that his data will not be stolen in route?

Encryption

Which elements would you expect in an acceptable-use policy? (Select Three)

Equipment ownershipIllegal useNetwork access

If John's boss asks him to install the networking technology defined by IEEE 802.3, what is he asking him to install?

Ethernet

What technology passes IP data over home-entertainment-device interconnect cables?

Ethernet over HDMI

In an IPv6 environment, which is a valid prefix for a link-local address?

FE80::/10

HTTP can be used to transfer files, but it is not as reliable or as fast as what protocol?

FTP

Which device or software program is best described as restricting traffic moving between a local network and the internet?

Firewall

You have just installed a new device that performs stateful packet filtering on your company's network. Which of the following describes this device?

Firewall

A NIC creates in the data link layer.

Frames

You are installing fiber-optic cable, and you need to combine two fiber-optic cables without losing quality. What would you need to do this?

Fusion splicer

What is the term for a frame that exceeds the maximum size?

Giant

Which term describes the rate at which usable information bits are delivered from one node to a destination?

Goodput

What does HVAC have to do with a rack installation?

Heating, ventilation, and air conditioning (HVAC) manages environment temperatures

Which of the following functions may be performed by a typical firewall? (Select Three)

Hides the LAN from unauthorized users on the outsideBlocks specified TCP portsMay block specified users from using the internet

Which technique would be used to test the network security of a particular network by allowing it to accept security attacks?

Honeynet

What would you call a single computer used to prevent real attacks against production networks by luring hackers into revealing their methods?

Honeypot

Which protocol is used with the ping command?

ICMP

If I wanted to find my IP address and subnet mask on a Linux PC, which command would I use?

Ifconfig

The boss has just read an article about zero-day attacks and rushes into your office in a panic, demanding to know what you will do to save the company network. What security technique would best protect against such attacks?

Implement effective security policies

Your first day on the job, the new boss tells you to check out the IDF. What is that?

Intermediate distribution frame

CHAP, MS-CHAP, and PAP are all authentication protocols for remote connectivity. However, the EAP authentication protocol offers something the other three do not. What is it?

It supports special authentication devices such as smart cards

A user is concerned that his password is being sent in clear text when he connects to the RADIUS server using PAP. Which of the following is true about security using RADIUS?

It uses a shared secret to encrypt messages between the client and server

A private network has which of the following traits?

Its IP addresses are not exposed to the internet.

Which of the following services is most likely to need an NTP server?

Kerberos

Which of the following protocols enables tunneling and encryption?

L2TP

At which layer of the OS model does an unmanaged switch operate?

Layer 2

At which layer of the OSI model does IP address-based routing occur?

Layer 3

Which device tests the power of fiber-optic light pulses?

Light meter

What routing algorithm does OSPF use?

Link state

Which table maps a destination MAC address to a port within a switch?

MAC addtess lookup table

Of the following network access security methods, which involves checking the physical addresses?

MAC filtering

Which options represent common hashing techniques? (Select Two)

MD5, SHA

Which of the following connectors would be found on a fiber-optic cable?

MT-RJ

A small office has just expanded into the neighboring office space, which is 25 feet (8 meters) away from the existing offices. A technician must establish connectivity between the old and the new offices. Which of the following solutions provides the most security from third-party tampering?

Make a CAT 5e connection between offices via the patch panel located in building's communication closet

Clark is troubleshooting a user's PC. They are using their browser to visit websites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening?

Man-in-the-Middle

Which of the following attacks enables a malicious person to view network traffic if the attacker is on the same network as the users?

Man-in-the-middle attack

You notice that your server experiences severe slowdown when many different services and applications are running. What Performance Monitor metric would indicate this?

Memory usage

When enabled on an Aruba wireless access point, 802.11a-ht and 802.11g-ht is more commonly known as what?

Mixed mode

Buck needs to provide connectivity to computers within a SOHO that is over 850 feet (259 meters) away from the main switch. Which of the following would he install to provide connectivity without using repeaters?

Multimode fiber

A network needs to pass HTTP traffic from a SOHO firewall with a public IP address to an internal web server with a private IP address. Which technology can accomplish this?

NAT

Many of your users have to spend a great deal of time on the internet doing research. Your company deals with very sensitive data and fears hackers penetrating the network. Which of the following can you use so that only one IP address is exposed to the Internet? (Select Two)

NAT, DMZ

User Leia is trying to map a drive to a known NetBIOS share but is unsuccessful. She pings the server that holds the share and gets a quick response. Which tool should she use to check if NetBIOS is enabled?

NBTSTAT

What protocol would a technician use to synchronize the local date and time of a client workstation to a server that is set up to provide accurate time?

NTP

Which type of external threat seeks to obtain sensitive information, such as government secrets?

Nation-state

Which of the following would be considered firewall technology? (Select Four)

Network Address Translation (NAT) Proxy server Packet filtering Port filtering

You notice that there has been heavier traffic than usual this week. Network utilization has slowed down the network significantly. Which document would you refer to in order to see how the network normally operates?

Network Performance Baseline

Which IT changes should be documented by the change-management team? (Select Three)

Network configuration Physical-location changes Additions to the network

Which OSI layer do routers function o

Network layer

Steve in the shipping department reports that his office is having a hard time connecting to the internet, but he is able to connect to the network. Which of the following pieces of documentation would be the most useful in figuring out his problem? (Select two.)

Network mapsWire schemes

Ripley is a corporate network tech. She receives a report in the morning about internet service being down at the site. Ripley got an email yesterday that there was a water main break in front of the site and repair work was going to be performed. On arrival at the site, she sees that there are workers performing repairs to the water system. She performs a test to make sure there are no internal network issues. The internal network is functional, but the laptop fails to connect to the Internet. Which of the following should be performed according to the network troubleshooting methodology?

Notify employees of the outage and contact the service provider of the demarc

What Windows utility enables you to query information from the DNS server and change how your system uses DNS?

Nslookup

SNMP uses management information bases (MIBs) to categorize the data that can be queried. What is used to uniquely number individual data pieces within a MIB?

Object identifiers (OID)

Evervone in a department is suddenly finding it difficult to connect to the WAP and the connection is slow for those who succeed. What are likely causes for these problems? (Select Three)

Overlapping channels Signal-to-noise ratio Device saturation

Which authentication protocol is supported by most network operating systems but is never used because it sends all passwords in clear text?

PAP

Why was PAP replaced by CHAP for PPP connections?

PAP sent the username and passoword in the clear

What kind of authentication method uses two keys to verify a sender's identity, a public key, and a private key?

PKI

A standard user in a company receives an email from what looks like her bank. It requests that she click on a link to fix her account information. What type of social engineering is this?

Phishing

Which of the following OS layers converts the ones and zeros into the type of signals needed for the network cable then places these signals on the cable?

Physical layer

Starting with Layer 1 (Physical Layer), which answer lists the layers of the OSI 7-Layer model in the correct order?

Physical, Data Link, Network, Transport, Session, Presentation, Application

What would be an effective way to prevent multicast flooding?

Place the multicast systems in a separate VLAN

Which of following types of cabling would be best to use near ventilation ducts to reduce toxic gases during a fire?

Plenum

Which term describes the orientation of radio waves of a Wi-Fi signal?

Polarization

Bullwinkle is trying to cut down on the amount of web traffic going between his network and the internet while still allowing all users to obtain the information they need. What might he use to accomplish this?

Proxy server

Which server acts as a go-between on Rocky's network, enabling the clients on his network to connect through it to access webpages instead of connecting to websites directly?

Proxy server

Which technology acts as a go-between to handle HTTP requests and responses for a network client?

Proxy server

Bob wants to setup a wireless network for his business. The network technician he has hired suggests that he utilizes the 802.1% standard for wireless authentication. Which of the following would he want the tech to set up?

RADIUS

Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a separate authentication server to gain access to the network. Which method would work best?

RADIUS

Which of the following methods of authentication will also provide AAA and uses UDP?

RADIUS

Which of the following are dynamic routing protocols? (Select Two)

RIP, OSPF

Which of the following is not a coaxial cable connector?

RJ-45

What is the scale manufacturers use to show the signal between a WAP and a receiver?

Received signal strength indication (RSSI)

Current versions of Windows Server can provide a secure tunnel via HTTPS for a Remote Desktop Connection (RDC) session. What does the server run to accomplish this?

Remote Desktop Gateway (RDG)

Your network administrator has decided to remove WINS from the network and replace it with DNS. Your WINS server resolves requests to twenty address locations on your network segment. What is the best way to ensure that users can reach those addresses by host name automatically?

Request that the hostnames and addresses be added into DNS

How can technician Sandy ensure that a particular IP address is not leased out from the active scope?

Reservations

When data arrives at the entrance to a network, what device determines the next network point to send the data to?

Router

Which of the following network devices does not send data based only on the MAC Address?

Router

Something has changed, and now, no one within the organization can access the internet. The ISP has checked everything beyond the demark and found no problems. Which are likely culprits for the outage? (Select Three)

Router configurationsCustomer-premises equipmentThrottling policy

Which of the following is the oldest routing protocol, rarely used anymore?

Routing Information Protocol (RIP)

A router sends a packet down a particular path that it thinks is correct, but the packet ends up back at a router that it already passed through. What is this called?

Routing loop

You are installing fiber-optic cable, and you need to combine two fiber-optic cables without losing quality. What would you need to do this?

Routing loop

Of the following connectors, which two are used with fiber-optic cable?

SC, ST

Why is it important to isolate a SCADA or ICS system from other corporate networks?

SCADA networks should be isolated to reduce security threats to the production line

Downloads from the Internet are slow on the corporate network. Which protocol can a technician use to show the necessary information in order to monitor network traffic to determine bandwidth usage?

SNMP

What protocol would enable Jill, the administrator of the Bayland Widget Corporation's network, to monitor her routers remotely?

SNMP

Which of the following protocols is associated with monitoring devices on a network?

SNMP

Edward has read about secure polling of network devices and wants to implement this on his network. What protocol should he use?

SNMPv3

A technician needs to manage a multi-layer switch with a secure connection. Which protocol should she use?

SSH

Which would be the most secure way for an administrator establish a connection to a remote UNIX server?

SSH

Which of the following is good copper cabling for environments with heavy electrical interference?

STP

A person who is new to the hacking world decides to try and impress his friends by attempting to hack into an FBI database. What would this person be described as?

Script kiddie

What is the purpose of a VPN concentrator?

Secure network access

Which layer of the SI seven-layer model keeps track of a system's connections to send the right response to the right computer?

Session layer

A new office's wireless network is causing interference with the medical office's wireless network located next door. Which of the following should be changed to best prevent the interference?

Signal Strength

A new office's wireless network is causing interference with the medical office's wireless network located next door. Which of the following should be changed to best prevent the interference?

Signal strength

MU-MIMO is a feature of the 802.11ac wireless standard. What does it provide?

Simultaneous transmission to multiple users

Which of the following cable types has the longest effective distance for a gigabit Ethernet connection?

Single-mode fiber

An accountant for a large corporation receives a call from an individual claiming to be John, a network technician in HQ. John tells the accountant that they have been having some problems with the active directory for a few employees and her account is one of the accounts experiencing problems. John then asks for her username and password so he can resolve the problem with the account. What is this scenario an example of?

Social engineering

Your new firewall has just been installed on the corporate LAN. Based on the rules you have implemented, the firewall takes an incoming packet on port 25 and inspects the entire data packet then allows the corresponding outgoing packet to pass through. What firewall technology best describes what is happening in this scenario?

Stateful filtering

Which of the following routing methods is the most difficult to manage?

Static

Which technology is an authentication solution that uses TCP and also provides AAA?

TACACS+

Which UDP protocol allows you to transfer files from one computer to another?

TFTP

Network technician Kyle is troubleshooting a connectivity problem with a new data circuit. Kyle confirms that the ST fiber jumper is good. Which of the following is the problem?

TX/RX reversed

Some switches can have more than one VLAN assigned to a single port. What kind of VLANs are these?

Tagged VLAN

Given a network problem scenario, a technician should identify the problem then establish a theory for the cause of the problem. What is the next logical troubleshooting step?

Test the theory to determine the cause

Comparing the TCP/IP model and the OS model, which of their respective layers retransmits a TCP packet if the packet is not received successfully at its destination?

The Transport OSI model layer and the Transport TCP/IP model layer

Comparing the TCP/IP model and the OSI model, which of their respective layers retransmits a TCP packet if the packet is not received successfully at its destination?

The Transport OSI model layer and the Transport TCP/IP model layer

large office has a group of fifteen users. Some of the users complain of poor performance. After scanning the network's performance, the network engineer discovers that many of the computers show moderate to weak signals even though there are two APs less than 15 feet (4 meters) away in either direction. Which of the following is most likely the cause?

The closest APs are down

You have just installed a new router in your MD and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats a broadcast packet on your network?

The router discards it

You have just installed a new router in your MDF and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats a broadcast packet on your network?

The router discards it

Connie has a typical home network that consists of a Linksys WRT54G wireless router and two systems. One is wirelessly connected, and the other is wired. The internal network ID is 192.168.16.0/24. Both systems can access the internet. While trying to determine why she cannot access a known website, Connie decides to run a tracert. The tracert stops at a particular router: 14.21.343.6. She tries to ping the router but gets no response. Which of the following is the most likely problem?

The router is down

How can a single NIC in a server transmit packets from multiple different source MAC addresses?

The server contains several virtual machines, and the MAC addresses are from the virtual machines

You recently installed wireless network cards for laptop users. The help desk receives a call from a user who could not access the network with a laptop while on a business trip, although the laptop worked fine when he tested it on his desk. What is the likely cause of the problem?

The user moved out of range of the access point

A home user is experiencing performance issues with her wireless network. She has checked the following issues: - Checked to make sure the laptop is within the appropriate wireless network range - Checked the connected SSID and wireless channel - Checked that the laptop is the only device connected to the wireless network Which is the most likely cause for the performance issues?

There are other wireless devices in the area that operate on the wireless band and on the same wireless channel

To accommodate a growing department, a new switch was installed with little configuration. Hosts attached to the new switch sometimes connect to the network and sometimes they do not. There is no discernable pattern to whether a node will successfully connect to the network. Which selection is the most likely cause of the problem?

There is a misconfigured DHCP server

The best (most secure) passwords have which of the following characteristics? (Select Two)

They should not be common words from the dictionary They should include a combination of letters and numbers

A network technician wants to map an FQDN to an internal server that has an IP address of 10.0.0.15. There is no NAT/PAT service running on the network. Why will this ultimately not work?

This is a private address which cannot be seen by external users

The process of arranging data into segments or datagrams occurs at which OSI model layer?

Transport

You just finished installing the last WAP in your building. However, you notice that several users in the area are not recognizing it as an available network. You decide this is a wireless coverage issue, but users are in offices and cannot move closer to the access point. What would be the most efficient step to take next?

Turn up the power on the WAP

What should you do after adding a new cable segment to a network?

Update the wiring schematics

You are working with your network administration team to create a new procedure for updating physical network diagrams. During the brainstorming session, your fellow teammates list the following ideas. Which of these is the most appropriate for updating the diagrams?

Update whenever new network equipment is installed or changed

Mike wants to connect two hubs. Which of the following will work? (Select Two)

Use a crossover cable between two normal ports Use a patch cable from an MDIX port to a normal port

Mike wants to connect two hubs. Which of the following will work? (Select Two)

Use a crossover cable between two normal portsUse a patch cable from an MDIX port to a normal port

Shelly has several users that are complaining about someone tampering with their computers. She knows that their passwords are not very secure and are easy to guess. She explains the recommended password practices. Which of the following statements should she include in her recommendations? (Select three.)

Use a password length of at least 8 characters Use a password with a combination of upper and lower case, numbers, and special symbols Change your password every 30 days at least

A network administrator for a small internet cafe has one switch but wants the public computers to be separated from the back office machines. What feature would help her achieve her goal?

VLAN

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout affecting only the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?

Verify that the switch has power

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout affecting only the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?

Verify that the switch has power

Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a separate authentication server to gain access to the network. Which method would work best?

WEP2

Which IEEE 802.11 encryption standard uses dynamic encryption key generation and offers much stronger security than its predecessor?

WPA

What are common reasons for a poor or non-working fiber-optic link? (Select Three)

Wavelength mismatch Dirty connectors Distance limitations

A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, she notes that the laptop is trying to reconnect to the wireless network. Which of the following is a common wireless problem that can cause this issue?

Weak signal strength

You work as an assistant network administrator for a medium sized company. You have been tasked with maintaining your company's configuration management documentation. When would it be a good time to make updates to your network maps?

When a router has been moved to another location

A chain-of-custody document includes what information? (Select Three)

When was evidence taken into custody What was taken into custody To whom was evidence passed and when

Brienne, an administrator, attempts to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. She verified the IP settings as correct, but the two computers still cannot connect. Which of the following would most likely fix the connectivity problem?

Wire pairs 1/2 and 3/6 need to be swapped on one end of the connecting cables

A network technician is trying to determine which TIA/EIA standard is being used for his MDF's patch panels. Where should he look to find this information?

Wiring schemes

Network technician John Watson, needs to check if the domain name resolution system is functioning properly. Which of the following software tools would he use to accomplish this? (Select Two)

dig, nslookup

Sandy is going to connect her network to the Internet. To keep her network secure, what should she install between her network and the internet connection?

firewall

What Linux command is used to check or change the IP address settings of a network-interface card?

ifconfig

While working on your LAN, you notice that you cannot access your file server. Which of the following utilities would you use first to troubleshoot the problem?

ipconfig

Buck needs to provide connectivity to computers within a SOHO that is over 850 feet (259 meters) away from the main switch. Which of the following would he install to provide connectivity without using repeaters?

multimode fiber

If you run "route print" at a Windows command prompt, you will get this output: Route Table ニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニ Interface List 0x1 ... MS TCP Loopback interface 0×10003 ...00 11 d8 30 16 cO ..... NVIDIA Force Networking Controller - Virt I Machine Network Services Driver コープ2ニニニニニニニニニニニニニニニニ 222222222222ニニニニニニコニコニコーコー ニニニニニニニニニニニニニニニニニニニニニニニニ ミニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニニ Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 10.12.14.1 10.12.14.101 1 10.12.14.0 255.255.255.0 10.12.14.101 10.12.14.101 1 10.12.14. 101 255.255.255.255 127.0.0.1 127.0.0.1 1 10.255.255.255 255.255.255.255 10.12.14.101 10.12.14.101 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.0.0 255.255.0.0 10.12.14.101 10.12.14.101 30 224.0.0.0 240.0.0.0 10.12.14.101 10.12.14.101 1 255.255.255.255 255.255.255.255 10.12.14.101 10.12.14.101 1 Default Gateway: 10.12.14.1 2222222222222222222222222222222222222222222222222222222ニニニニニニニニニニニニニニニニニニニ Persistent Routes: None What other command will give you the exact same output?

netstat -r

Which of following types of cabling would be best to use near ventilation ducts to reduce toxic gases during a fire?

plenum

A __________ enables the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently because the information can be downloaded once for use by multiple hosts.

proxy server

Janet is entering sensitive information into a database. Tom passes by and notices what she is typing and decides to ask Janet a question about the company party coming up over the weekend. What social engineering tactic is Tom using?

shoulder surfing

Which command will display the current configuration for a switch?

show config

Which Cisco IOS command shows the statistics for network interfaces?

show interface

Which of the following multiport devices works at the Data Link Layer (Layer 2) and is responsible for filtering, forwarding, and sending frames?

switch

A rancher wants to use a wireless camera he has installed in his barn, which is about 100 yards from his house. What kind of antennas should he use on the house and barn to get the best signal?

unidirectional

Extensible Authentication Protocol, or EAP, is a type of authentication/security protocol used in __________ networks

wireless

Extensible Authentication Protocol, or EAP, is a type of authentication/security protocol used in __________ networks.

wireless


Related study sets

Biochemistry - Citric Acid Cycle

View Set

MGMT - Chapter 10, Chapter 8 MGT 405, Chapter 7, mgmt Chapter 9 (strategic mgmt mc)

View Set

Sadlier-Oxford Vocabulary Workshop Level A Unit 10 - Antonyms (Bold Only)

View Set

Chapter 3 & 4 - Banquet and Catering

View Set

The Fourth Amendment: Arrests Part II

View Set

USA Test Prep Benchmark Pre Test - NETOCEKALU K12

View Set

Middle East Countries and Capitals

View Set