Which of these represents the Internet Protocol version 6 (IPv6) Ioopback address?
Which of these represents the Internet Protocol version 6 (IPv6) Ioopback address?A . 127.0.0.1B . 192.168.0.1C . FEC0:A8C0::AA01D . ::1View AnswerAnswer: D
Teredo tunneling is a protocol that:
Teredo tunneling is a protocol that:A . Translates Internet Protocol version 4 (lPv4) to Internet Protocol version 6 (lPv6).B . Allows lPv6 connectivity through lPv4 devices.C . Provides VPN security.D . Dynamically allocates I Pv6 addresses.View AnswerAnswer: B
The command-line tool used to list a host’s active incoming connections is:
The command-line tool used to list a host’s active incoming connections is:A . NETSTATB . IPCON FIGC . NSLOOKUPD . PINGView AnswerAnswer: A
Which of the following are features of DHCP? (Choose two.)
Which of the following are features of DHCP? (Choose two.)A . IP address resolution to canonical namesB . Secure shell connectionsC . Address reservationD . Network file transferE . IP address exclusionView AnswerAnswer: C, E
When a client’s DHCP-issued address expires, the client will:
When a client’s DHCP-issued address expires, the client will:A . Select a new address and request approval from the DHCP server.B . Require manual configuration with a static lP address.C . Attempt to obtain a new address by broadcasting.D . Continue to use the address until it is notified to...
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)A . 802.1 IfB . 802.llgC . 802.11kD . 802.llmE . 802.llnView AnswerAnswer: B, E
What is the default subnet mask for a Class C Internet network?
What is the default subnet mask for a Class C Internet network?A . 255.255.255.252B . 255.255.255.240C . 255.255.255.192D . 255.255.255.0View AnswerAnswer: D
Attenuation in a wireless network signal is a result of:
Attenuation in a wireless network signal is a result of:A . Number of wireless nodes connected.B . Distance from the access point.C . Interference from cellular phones.D . Encryption of the signal.View AnswerAnswer: B
In which physical network topology is each computer connected to a central point?
In which physical network topology is each computer connected to a central point?A . StarB . MeshC . RingD . BusView AnswerAnswer: A
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)A . Token ringB . EthernetC . Dial-upD . Leased lineView AnswerAnswer: C, D