A network technician is requesting a fiber patch cord with a connector that is round and twists to install. Which of the following is the proper name of this connector type?
Which of the following should be configured so users can authenticate to a wireless network using company credentials?
Which of the following network traffic type is sent to all nodes on the network?
Which of the following should an installer orient a port-side exhaust to when installing equipment?
Which of the following network topologies contains a direct connection between every node in the network?
A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:
nginx
CopyEdit
switchport mode access
switchport voice vlan 69
With which of the following VLANs will the workstation traffic be tagged?
Which of the following is the best example of a networking appliance that connects different network segments and directs allowed traffic between specific segments?
Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?
A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?
Which of the following technologies are X.509 certificates most commonly associated with?
Which of the following would an adversary do while conducting an evil twin attack?
Which of the following allows a user to authenticate to multiple resources without requiring additional passwords?
A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?
Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?