网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()
A
IDF
B
66 block
C
MDF
D
110 block
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A IDFB 66 blockC MDFD 110 block” 相关考题
考题
Which of the following holds multiple connections and is usually maintained by the telephone company?()
A.DemarcB.IDFC.MDFD.110 block
考题
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()
A.568AB.568BC.CrossoverD.Loopback
考题
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()
A. IDFB. 66 blockC. MDFD. 110 block
考题
An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?()A、MultimeterB、SnipsC、Toner probeD、Punch down tool
考题
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A、IDFB、66 blockC、MDFD、110 block
考题
An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()A、Network data cables are damaged.B、Memory has become unseated.C、The user has defragmented the hard drive.D、Processor cooling fan is not functioning.
考题
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A、568AB、568BC、CrossoverD、Loopback
考题
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP
考题
A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following holds multiple connections and is usually maintained by the telephone company?()A、DemarcB、IDFC、MDFD、110 block
考题
A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A、MAC filteringB、PoEC、IP filteringD、802.1X
考题
Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping
考题
单选题For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?()A
255.255.0.0B
255.255.248.0C
255.255.255.0D
255.255.255.255
考题
单选题A small push button typically found on the inside of a server case is MOST likely used for which of the following purposes?()A
UID switchB
Power switchC
Cooling fan switchD
Chassis intrusion switch
考题
单选题Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A
tracertB
netstatC
nslookupD
ping
考题
单选题A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A
Unmanaged switchB
Hardware firewallC
HubD
Managed switch
考题
单选题A snatch block would most likely be used as a().A
boat fallB
fairleadC
riding pawlD
topping lift
考题
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A
AESB
TKIPC
802.1qD
ISAKMP
考题
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A
AES B
TKIPC
802.1qD
ISAKMP
考题
单选题Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A
568AB
568BC
CrossoverD
Loopback
考题
单选题A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A
MAC filteringB
PoEC
IP filteringD
802.1X
考题
单选题A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()A
StraightB
ConsoleC
CrossoverD
Loopback
考题
单选题A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A
Cable testerB
MultimeterC
Loop back plugsD
Crossover cable
考题
单选题Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A
Baseline configurationB
Security policyC
Performance and transaction logsD
Physical network diagram
考题
单选题Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A
IDSB
VPNC
NIPSD
HIDS
考题
单选题An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()A
Network data cables are damaged.B
Memory has become unseated.C
The user has defragmented the hard drive.D
Processor cooling fan is not functioning.
热门标签
最新试卷