A Media Access Control (MAC) address identifies a/an:

A Media Access Control (MAC) address identifies a/an:A . UPnP device.B . Local broadcast domain.C . Network interface card (NIC).D . Local area network (LAN).View AnswerAnswer: C

January 17, 2019 No Comments READ MORE +

Which command is used to verify that a server is connected to the network?

Which command is used to verify that a server is connected to the network?A . IPCON FIGB . ROUTEC . PINGD . CHECKView AnswerAnswer: C

January 11, 2019 No Comments READ MORE +

Which subnet mask is valid?

Which subnet mask is valid?A . 255.255.255.240B . 255.255.255.228C . 255.255.255.164D . 255.255.255.245View AnswerAnswer: A

January 10, 2019 No Comments READ MORE +

The topology of a local area network (LAN) is defined by the:

The topology of a local area network (LAN) is defined by the:A . Number of devices to connect.B . Physical and logical characteristics.C . Distance between workstations.D . Type of cable being used.View AnswerAnswer: B

January 7, 2019 No Comments READ MORE +

Which of these factors has the biggest impact on data transmission speed in a wireless network?

Which of these factors has the biggest impact on data transmission speed in a wireless network?A . The access method used for the networkB . The transmission standard of the equipment usedC . The use of strong encryption for transmissionsD . The transmission wattage rating used on the NICView AnswerAnswer:...

January 1, 2019 No Comments READ MORE +

The default subnet mask for a Class B network is:

The default subnet mask for a Class B network is:A . 0.0.0.255B . 0.0.255.255C . 255.0.0.0D . 255.255.0.0View AnswerAnswer: D

December 30, 2018 No Comments READ MORE +

Which type of port is used to support VLAN traffic between two switches?

Which type of port is used to support VLAN traffic between two switches?A . Virtual portB . WAN portC . Trunk portD . LAN portView AnswerAnswer: C

December 27, 2018 No Comments READ MORE +

Which wireless authentication method provides the highest level of security?

Which wireless authentication method provides the highest level of security?A . Wired Equivalency Privacy (WEP)B . IEEE 802.llnC . WI-Fl Protected Access (WPA)D . IEEE 802.llaView AnswerAnswer: C

December 25, 2018 No Comments READ MORE +

Attenuation in a wireless network signal is a result of:

Attenuation in a wireless network signal is a result of:A . Number of wireless nodes connected.B . Distance from the access point.C . Interference from cellular phones.D . Encryption of the signal.View AnswerAnswer: B

December 22, 2018 No Comments READ MORE +

Which of the following uses a tunneling protocol?

Which of the following uses a tunneling protocol?A . InternetB . VPNC . ExtranetD . VLANView AnswerAnswer: B

December 17, 2018 No Comments READ MORE +