Tech Learn Nr. 5
My Cards for Tech Learn Nr. 5
My Cards for Tech Learn Nr. 5
Fichier Détails
Cartes-fiches | 72 |
---|---|
Langue | English |
Catégorie | Informatique |
Niveau | Université |
Crée / Actualisé | 28.12.2014 / 28.12.2014 |
Lien de web |
https://card2brain.ch/box/tech_learn_nr_5
|
Intégrer |
<iframe src="https://card2brain.ch/box/tech_learn_nr_5/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Créer ou copier des fichiers d'apprentissage
Avec un upgrade tu peux créer ou copier des fichiers d'apprentissage sans limite et utiliser de nombreuses fonctions supplémentaires.
Connecte-toi pour voir toutes les cartes.
In which default order will a router search for startup configuration information?
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
Which statement is true about DHCP operation?
Which type of wireless security is easily compromised?
What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?
Which protocol supports rapid delivery of streaming media?
A network administrator notices that the throughput on the network appears lower than expected when compared to the end-to-end network bandwidth. Which three factors can explain this difference? (Choose three.)
Which group of IPv6 addresses cannot be allocated as a host source address?
A host PC is attempting to lease an address through DHCP. What message is sent by the server to the client know it is able to use the provided IP information?
Refer to the exhibit.
The network administrator enters these commands into the R1 router:
R1# copy running-config tftp
Address or name of remote host [ ]?
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?
Which three statements characterize the transport layer protocols? (Choose three.)
What is the purpose of ICMP messages?
A technician uses the ping 127.0.0.1 command. What is the technician testing?
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
What is a characteristic of the LLC sublayer?
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
NOT: the bandwidth of the WAN connection to the Internet
When applied to a router, which command would help mitigate brute-force password attacks against the router?
Which two statements correctly describe a router memory type and its contents? (Choose two.)
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
-
- 1 / 72
-