<< Prev Question Next Question >>

Question 23/150

Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: A network technician is creating a new subnet for 488 host m...
Question 2: Kim, a network administrator, should consult which documenta...
Question 3: Which of the following is a secure way to connect to a devic...
Question 4: Zach, a technician, suspects a duplicate IP address assignme...
Question 5: When choosing a type of storage that integrates with the exi...
Question 6: When using high bandwidth applications over multiple WAN con...
Question 7: A telecommunications provider has just deployed a new OC-12 ...
Question 8: A technician is planning a remote-access strategy to manage ...
Question 9: Which of the following policies would Joe, a user, have to a...
Question 10: Which of the following WAN technologies is MOST preferred wh...
Question 11: A technician, Joe, visits a site that has reported a network...
Question 12: Which of the following is the network topology in which comp...
Question 13: No link lights on a switch's SFP are functioning, so the net...
Question 14: Which of the following ports does DHCP use? (Select TWO)....
Question 15: A technician is troubleshooting a problem with a network pri...
Question 16: An administrator is replacing an existing WAP because the cu...
Question 17: Which of the following is the correct port number for NTP?...
Question 18: Kim, a user, cannot access the network using wireless. Which...
Question 19: A network technician has just configured NAC for connections...
Question 20: A technician is connecting a router directly to a PC using t...
Question 21: HOTSPOT Workstations are unable to access the Internet after...
Question 22: Kim, the client, has requested a cost-effective network solu...
Question 23: Which of the following network topologies allows only commun...
Question 24: Jeff, a business owner, has discovered that several of the n...
Question 25: A network technician is configuring a wireless network at a ...
Question 26: Which of the following would Sandy, a technician, find in a ...
Question 27: An analyst is developing a proof of concept of a wireless-ba...
Question 28: A Network administrator has been given a network of 172.16.8...
Question 29: Which of the following protocols do MOST MITM attacks utiliz...
Question 30: A company only wants preapproved laptops to be able to conne...
Question 31: A network technician configures a firewall's ACL to allow ou...
Question 32: Ann, a network technician, has just installed a fiber switch...
Question 33: Which of the following devices should be installed on a netw...
Question 34: Lisa, a technician, has configured a new switch that is remo...
Question 35: Which of the following is a proprietary routing protocol?...
Question 36: Two WAPs are positioned with overlapping coverage, but seaml...
Question 37: After a server outage, a technician discovers that a physica...
Question 38: A user is unable to print to a network printer. Which of fol...
Question 39: Which of the following would be the MOST efficient subnet ma...
Question 40: A network administrator configures an email server to use se...
Question 41: Which of the following cables will MOST likely be used to co...
Question 42: Which of the following MUST be implemented to share metrics ...
Question 43: A contractor is setting up and configuring conference rooms ...
Question 44: Which of the following devices should a network administrato...
1 commentQuestion 45: A customer cannot access a company's secure website. The com...
Question 46: In order to reduce spam email, Kim, a network administrator,...
Question 47: Which of the following provides the MOST protection against ...
Question 48: A network technician is troubleshooting intermittent issues ...
Question 49: Which of the following protocols is used for remote manageme...
Question 50: A user reports that a laptop cannot connect to the Internet ...
Question 51: Which of the following does the IP address 169.254.222.10 in...
Question 52: Which of the following is the MOST economical way for Sandy,...
Question 53: Something you have, something you are, and something you kno...
Question 54: The server team has just installed an application across thr...
Question 55: Which of the following wireless standards is capable of ONLY...
Question 56: Which of the following functions would be used to securely m...
Question 57: A technician replaces a failed router with a spare that has ...
Question 58: A user checks an IP address using an external website. The a...
Question 59: Which of the following allows a central point to simultaneou...
Question 60: A company wants to only allow incoming HTTP and HTTPS traffi...
Question 61: An employee wishes to use a personal cell phone for work-rel...
Question 62: A network technician is deploying mobile phones for a compan...
Question 63: A company has installed an access point and configured it to...
Question 64: A technician is diagnosing an issue with a new T1 connection...
Question 65: Which of the following protocols is used to securely connect...
Question 66: Lisa, an administrator, has set up an 802.11n wireless netwo...
Question 67: A penetration tester has been tasked with reconnaissance to ...
Question 68: The software that allows a machine to run multiple operating...
Question 69: Which of the following protocols is used to transmit outgoin...
Question 70: A new user is reporting connectivity issues. Zach, the netwo...
Question 71: A network administrator suspects an employee of using the co...
Question 72: Users are reporting Internet connectivity issues. The networ...
Question 73: The process of attempting to exploit a weakness in a network...
Question 74: A technician is setting up a firewall on the network that wo...
Question 75: Kurt, a network technician, has configured a new firewall on...
Question 76: A technician is setting up a public guest network for visito...
Question 77: A network administrator wants to monitor traffic by deployin...
Question 78: Which of the following defines when Pete, an attacker, attem...
Question 79: A building is equipped with light sensors that turn off the ...
Question 80: A network administrator has created a virtual machine in the...
Question 81: A company has contracted with an outside vendor to perform a...
Question 82: An administrator is moving to a new office. There will be se...
Question 83: Which of the following devices exist as either hardware or s...
Question 84: Which of the following is used to classify network data for ...
Question 85: Keeping an authoritative and timely record of network device...
Question 86: Which of the following ports are MOST commonly used to inter...
Question 87: Which of the following default ports would need to be open o...
Question 88: A company is experiencing accessibility issues reaching serv...
Question 89: Which of the following is an example of two factor authentic...
Question 90: Which of the following problems is MOST likely to arise when...
Question 91: Which of the following protocols are used to connect devices...
Question 92: Which of the following could be used to stop unknown threats...
2 commentQuestion 93: Which of the following protocols is used to allow multiple h...
Question 94: Users are reporting their network is extremely slow. The tec...
Question 95: A systems administrator has recently purchased and installed...
Question 96: Which of the following media types can carry a standard Ethe...
Question 97: Which of the following technologies allows for redundant lin...
1 commentQuestion 98: Users are reporting issues with slow connection speeds and a...
Question 99: A national cable company providing TV, telephone, and Intern...
Question 100: A workstation on the network is configured as follows. A use...
Question 101: A technician is installing a new wireless badging system on ...
Question 102: A technician wants to connect a new wireless router to a mai...
Question 103: The network optimization process used to allow reasonable us...
Question 104: A single PRI can deliver multiple voice calls simultaneously...
Question 105: In which of the following ways does a DDoS attack differ fro...
Question 106: Which of the following needs to be configured on a switch to...
Question 107: Which of the following ports is the default telnet port?...
Question 108: A network technician is able to connect the switches between...
Question 109: Which of the following ports should be allowed through a fir...
Question 110: A network technician is troubleshooting an issue and has est...
Question 111: Which of the following is a routed protocol that functions a...
Question 112: An organization wants to perform maintenance on any of its w...
Question 113: Zach, a network administrator, needs to purchase a new switc...
Question 114: An office user cannot access local network drives but has fu...
Question 115: The software in a virtualized environment that controls reso...
Question 116: Tenants access multiple wireless networks in a building. Use...
Question 117: Which of the following has a maximum transfer rate of 54Mbps...
Question 118: A device operating at Layer 3 of the OSI model uses which of...
Question 119: Which of the following physical security controls is MOST li...
Question 120: Which of the following DNS records needs to be configured fo...
Question 121: Which of the following mediums is circuit switched?...
Question 122: A network administrator would like to collect information fr...
Question 123: Please refer to the attached exhibit. Which of the following...
2 commentQuestion 124: An office network consists of one two-port router connected ...
Question 125: A network technician is troubleshooting wireless network iss...
Question 126: A technician is investigating a server performance issue. Th...
Question 127: When configuring a wireless access point, Zach, a network ad...
Question 128: Which of the following subnet masks would allow for 192.168....
Question 129: Which of the following is a vulnerable system designed to de...
Question 130: Which of the following is characterized by an attacker attem...
Question 131: Which of the following communication modes has the LOWEST ov...
Question 132: Which of the following 802.11n features allows for the use o...
Question 133: A new firewall was recently installed blocking SMTP traffic....
Question 134: A SOHO office recently installed a wireless network for empl...
Question 135: An ISP technician gets a call from a business that just chan...
Question 136: Which of the following cable types have a rated MAXIMUM band...
Question 137: A technician is replacing a switch at a branch office and di...
1 commentQuestion 138: A company finds that many desktops are being reported as mis...
Question 139: Kim, a network administrator, is seeing workstations in buil...
Question 140: To replace a defective UPS, the network administrator must t...
Question 141: A network administrator has a monitoring system in place tha...
Question 142: A network administrator wishes to ensure there are no unnece...
Question 143: Witch of the following policies would Joe, a user have to ag...
Question 144: Lisa, a technician, is tasked to monitor various analog POTS...
Question 145: Which of the following is the default subnet mask for a Clas...
Question 146: A company has a large number of employees that need VPN acce...
Question 147: company wants the public to be able to connect to the wirele...
Question 148: Which of the following is the number of broadcast domain tha...
Question 149: An engineer is reviewing the implementation requirements for...
Question 150: A network technician installs a web server on the firewall. ...