The function of a router is to:
The function of a router is to:A . Provide IP subnet masks for hosts.B . Forward traffic to other networks.C . Broadcast routing tables to clients.D . Store tables for name resolution.View AnswerAnswer: B Explanation: A router is a device that forwards data packets along networks. A router is connected...
Why do you receive a response on the second attempt but not on the first attempt?
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt?A . PING...
Which type of network covers the broadest area?
Which type of network covers the broadest area?A . WANB . CANC . LAND . PANView AnswerAnswer: A Explanation: A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.
If a router cannot determine the next hop for a packet, the router will:
If a router cannot determine the next hop for a packet, the router will:A . Forward the packet to the default route.B . Send the packet back to the packet's source.C . Broadcast the packet.D . Store the packet in the memory buffer.View AnswerAnswer: A Explanation: If there is no...
A cable that meets the l000BaseT standard has a maximum length of:
A cable that meets the l000BaseT standard has a maximum length of:A . 100 mB . 250 mC . 500 mD . 1,000 mView AnswerAnswer: A Explanation: When used for 10/100/1000BASE-T, the maximum allowed length of a Cat 6 cable is 100 meters or 328 feet.
A network device that associates a Media Access Control (MAC) address with a port is a:
A network device that associates a Media Access Control (MAC) address with a port is a:A . DSL modemB . HubC . RouterD . SwitchView AnswerAnswer: D Explanation: A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This...
To protect a network when it is connected to the Internet, you should use a:
To protect a network when it is connected to the Internet, you should use a:A . BridgeB . FirewallC . SwitchD . RouterView AnswerAnswer: B Explanation: A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it...
One reason to incorporate VLANs in a network is to:
One reason to incorporate VLANs in a network is to:A . Increase the number of available IP addresses.B . Increase the number of available Media Access Control (MAC) addresses.C . Reduce the number of broadcast domains.D . Reduce the number of nodes in a broadcast domain.View AnswerAnswer: D Explanation: VLANs...
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)A . 802.1 IfB . 802.11gC . 802.11kD . 802.11mE . 802.11nView AnswerAnswer: BE Explanation: The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard...
Which command is used to verify that a server is connected to the network?
Which command is used to verify that a server is connected to the network?A . IPCONFIGB . ROUTEC . PINGD . CHECKView AnswerAnswer: C Explanation: Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure...