A Media Access Control (MAC) address identifies a/an:
A Media Access Control (MAC) address identifies a/an:A . UPnP device.B . Local broadcast domain.C . Network interface card (NIC).D . Local area network (LAN).View AnswerAnswer: C
Which command is used to verify that a server is connected to the network?
Which command is used to verify that a server is connected to the network?A . IPCON FIGB . ROUTEC . PINGD . CHECKView AnswerAnswer: C
Which subnet mask is valid?
Which subnet mask is valid?A . 255.255.255.240B . 255.255.255.228C . 255.255.255.164D . 255.255.255.245View AnswerAnswer: A
The topology of a local area network (LAN) is defined by the:
The topology of a local area network (LAN) is defined by the:A . Number of devices to connect.B . Physical and logical characteristics.C . Distance between workstations.D . Type of cable being used.View AnswerAnswer: B
Which of these factors has the biggest impact on data transmission speed in a wireless network?
Which of these factors has the biggest impact on data transmission speed in a wireless network?A . The access method used for the networkB . The transmission standard of the equipment usedC . The use of strong encryption for transmissionsD . The transmission wattage rating used on the NICView AnswerAnswer:...
The default subnet mask for a Class B network is:
The default subnet mask for a Class B network is:A . 0.0.0.255B . 0.0.255.255C . 255.0.0.0D . 255.255.0.0View AnswerAnswer: D
Which type of port is used to support VLAN traffic between two switches?
Which type of port is used to support VLAN traffic between two switches?A . Virtual portB . WAN portC . Trunk portD . LAN portView AnswerAnswer: C
Which wireless authentication method provides the highest level of security?
Which wireless authentication method provides the highest level of security?A . Wired Equivalency Privacy (WEP)B . IEEE 802.llnC . WI-Fl Protected Access (WPA)D . IEEE 802.llaView AnswerAnswer: C
Attenuation in a wireless network signal is a result of:
Attenuation in a wireless network signal is a result of:A . Number of wireless nodes connected.B . Distance from the access point.C . Interference from cellular phones.D . Encryption of the signal.View AnswerAnswer: B
Which of the following uses a tunneling protocol?
Which of the following uses a tunneling protocol?A . InternetB . VPNC . ExtranetD . VLANView AnswerAnswer: B