1.
Logical Topology (also referred to as Signal Topology) is a network computing term used to describe the arrangement of devices on a network and how they communicate with one another. Which logical topology uses distributed authentication?
2.
There are several different standards for this copper-based physical medium. The most widely used are 10BASE-T, 100BASE-TX, and 1000BASE-T (Gigabit Ethernet), running at 10 Mbit/s, 100 Mbit/s, and 1000 Mbit/ s (1 Gbit/s) respectively. 10Base-T differs from100Base-T in which of thefollowing ways?
3.
You have received a call, saying that users are able to visit Internet web pages but can??t visit the internal company website. Why?
4.
Which media type is NOT susceptible to electromagnetic interference (EMI)?
5.
According to the following presented information, can you tell me which of the following has been used? Tracing route to 172.30.0.78 over a maximum of 30 hops 1 <1 ms <1 ms172.30.0.78
6.
A user wants to use his laptop through the wireless network. The wireless has been configured with DHCP, and a temporary WEP key has been assigned. Why the laptop fails to connect to the network?
7.
Which layer of the OSI model routes data across segments?
8.
Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point-to-Point connections. On wireless networks, EAP expands onauthentication methods used by which of the following?
9.
Given a device from outside the network, if you want to mask the IP address of this device, which of the following will you use?
10.
Several hosts with an IP address of 169.254.0.1 can't access the network. As a network technician, which of the following will you examine?