Which of the following network protocols is used for a secure command line interface for management of network devices?
Secure Shell is a cryptographic network protocol for secure data communication, remote command-line login, remote
command execution, and other secure network services between two networked computers.
Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?
Which of the following network topologies describes a network where each node is connected to multiple devices?
Which of the following TCP/IP model layers does the OSI model Presentation layer map to?
The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to
troubleshoot this issue?
Which of the following components of wiring distribution is referred to as the core communications closet for an organization?
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the
company LAN equipment resides. Which of the following identifies the location?
Short for main distribution frame, a cable rack that interconnects and manages the telecommunications wiring between itself
and any number of IDFs. Unlike an IDF, which connects internal lines to the MDF, the MDF connects private or public lines
coming into a building with the internal network.
A technician tests a cable going to the patch panel and notices the following output from the cable tester:
On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue?
An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following
monitoring resources provides the ability to collect this information encrypted over the network?
A technician has spent most of the day replacing a server running DHCP. Some of the users have begun to call the help
desk stating that Internet connection stopped working even after rebooting. Upon investigation, the users PCs with issues all
have IP addresses that start with 169.254.x.x. The technician completes the replacement and powers on the new DHCP
server. Which of the following is the BEST way to provide the PCs with issues a new IP address?
Which of the following performance benefits would multiple domain controllers BEST provide?
Fault-tolerant design is a design that enables a system to continue its intended operation, possibly at a reduced level, rather
than failing completely, when some part of the system fails. The term is most commonly used to describe computer-based
systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in
response time in the event of some partial failure
Which of the following tools will scan a network for hosts and provide information on the installed operating system?
A technician is sorting patch cables into four bins labeled coaxial, crossover, straight-through, and fiber. The technician has a
cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of
the cable start with a green wire. Into which of the following bins should this cable be placed?
Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of
unauthorized traffic are detected on the network?
A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has
found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of
the following would MOST likely resolve the connectivity issue?