Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Quiz 3: Networking
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
How many non-overlapping channels are available with the 802.11a wireless standard?
Question 102
Multiple Choice
Which of these protocols provides TCP/IP functions like IP addresses, subnet masks, default gateways, and DNS server information for hosts on a network?
Question 103
Multiple Choice
Which one of the following protocols distributes information about the configuration of a new VLAN to the entire switched network?
Question 104
Multiple Choice
David is a network administrator at his organization. He must use a routing protocol to connect the two autonomous systems as displayed in the figure. Which protocol should he choose?
Question 105
Multiple Choice
Which of the WAN data-link protocols below is used for out-of-band signaling?
Question 106
Multiple Choice
Which of the following switching modes provides the highest level of integrity and error-free transport, while sacrificing the speed of data transfer?
Question 107
Multiple Choice
David is a network administrator in his organization. He has connected one of the company's servers directly to a Cisco switch through the Fa0/1 port. He wants to restrict access to other servers on this port. Which of the following should he do?
Question 108
Multiple Choice
You want to prevent hosts from accessing the network if their MAC address is not authenticated to do so. Which of the following can be configured on a switch to prevent hosts with unauthorized MAC addresses from connecting to the network through a switch?
Question 109
Multiple Choice
Which of the following protocols provides best encryption in an IPsec VPN?
Question 110
Multiple Choice
Which of the following examines and recognizes different known attacks, as compared to a list of common attack signatures?
Question 111
Multiple Choice
During a data transfer from one PC to another, which of the following accurately describes the order of how data will be encapsulated?
Question 112
Multiple Choice
Which of the following is a technology that Catalyst switches utilize to identify and prevent topology loops and ensure that data flows properly through a single network path?
Question 113
Multiple Choice
Identify the component that must be elected before the Spanning Tree Protocol can converge in a switched LAN?
Question 114
Multiple Choice
David is trying to troubleshoot an issue with his organization's frame relay network. He logs onto the remote router via a telnet session and issues the command "debug frame-relay lmi." He fails to see any output, even after a long time. Which of the following should he do to solve the issue?
Question 115
Multiple Choice
Two computers are communicating using a TCP protocol. The receiving host has failed to receive all of the segments that should be acknowledged. Which of the following can the host do to improve the reliability of this communication session?