Term
|
Definition
Which utility can be used to determine end-to-end connectivity between source and destination? |
|
|
Term
|
Definition
A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose? |
|
|
Term
1. The company network requires secure access to confidential information.
2.The users need a central database to store inventory and sales information.
3.The data gathered by the employees is critical and should be backed up on a regular basis.
|
|
Definition
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? |
|
|
Term
It is the device that translates domain names to IP addresses. |
|
Definition
[image]
What is the purpose of the device that uses the 198.133.219.43 address? |
|
|
Term
Attach a cable that has an RJ-45 connector. |
|
Definition
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time? |
|
|
Term
|
Definition
Which protocol is used to automatically configure network devices? |
|
|
Term
The number of twists in the wires inside the cable.
The number of wires inside the cable |
|
Definition
Which two factors are used to determine the different categories of UTP cabling |
|
|
Term
|
Definition
Which protocol lacks support for encryption and can be initiated from a computer command prompt? |
|
|
Term
|
Definition
Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site? |
|
|
Term
supported by IEEE 802.3 standards
uses a bus logical topology |
|
Definition
Which two characteristics describe Ethernet technology? |
|
|
Term
|
Definition
Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps? |
|
|
Term
|
Definition
Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations? |
|
|
Term
|
Definition
Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing? |
|
|
Term
|
Definition
What is the maximum range a data signal can travel through a 1000BASE-T network segment? |
|
|
Term
|
Definition
Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? |
|
|
Term
|
Definition
Which term describes the process of adding headers to data as it moves through the layers of the OSI mod |
|
|
Term
Computers listen to the network for clearance to send data. |
|
Definition
Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network? |
|
|
Term
|
Definition
Which device enables computers to be attached to a network without segmenting the network? |
|
|
Term
|
Definition
[image]
Refer to the exhibit. Which type of network cable is shown? |
|
|
Term
|
Definition
Which network topology will allow all devices to continue to communicate with each other should a network cable fail? |
|
|
Term
|
Definition
A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform? |
|
|
Term
|
Definition
Which digital technology provides an upstream speed that is typically less than the downstream speed? |
|
|
Term
The Windows firewall stops pings |
|
Definition
A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be? |
|
|
Term
the available wireless networks within range |
|
Definition
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check? |
|
|
Term
A domain provides centralized control. |
|
Definition
What is one difference between a network domain and a workgroup? |
|
|
Term
The bank encrypts the web page information that is sent and received |
|
Definition
A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols? |
|
|
Term
|
Definition
Which three protocols are associated with e-mail |
|
|
Term
Cisco Brand Protection Team |
|
Definition
Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit? |
|
|
Term
1. The price is much less than expected.
2. The equipment appears to be performing at a substandard level.
3. The packaging appears to be substandard compared to the packaging of other Cisco purchases. |
|
Definition
When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? |
|
|
Term
|
Definition
Which Windows XP command displays the route taken by packets crossing an IP network? |
|
|