1.
Which of the following layers of the OSI model is above the Session layer?
2.
Which of the following commands can be used to check whether the DNS server for a given domain is reachable?
3.
Which of the following network access methods is the MOST secure?
4.
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?
5.
Which of the following security threats relies primarily on user deception and misinformation?
6.
A network technician is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?
7.
A network technician is tasked with implementing a wireless network at a corporate office with a broad coverage area for the wireless employees. Wireless network throughput should be maximized. Which of the following would BEST meet these requirements?
8.
Several users in a SOHO are having problems staying connected to the WAP. The technician notices the WAP supporting the SOHO is located in a broom closet down the hall. Which of the following will MOST likely alleviate the problem?
9.
After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?
10.
A technician is configuring a wireless network. Which of the following should the technician setup in order to prevent intruders if the encryption key gets compromised?