单选题Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()AIDFB66 blockCMDFD110 block
单选题
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()
A
IDF
B
66 block
C
MDF
D
110 block
参考解析
解析:
暂无解析
相关考题:
Which of the following holds multiple connections and is usually maintained by the telephone company?() A.DemarcB.IDFC.MDFD.110 block
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?() A.568AB.568BC.CrossoverD.Loopback
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?() A. IDFB. 66 blockC. MDFD. 110 block
An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?()A、MultimeterB、SnipsC、Toner probeD、Punch down tool
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A、IDFB、66 blockC、MDFD、110 block
An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()A、Network data cables are damaged.B、Memory has become unseated.C、The user has defragmented the hard drive.D、Processor cooling fan is not functioning.
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A、568AB、568BC、CrossoverD、Loopback
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP
A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
Which of the following holds multiple connections and is usually maintained by the telephone company?()A、DemarcB、IDFC、MDFD、110 block
A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A、MAC filteringB、PoEC、IP filteringD、802.1X
Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping
单选题For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?()A255.255.0.0B255.255.248.0C255.255.255.0D255.255.255.255
单选题A small push button typically found on the inside of a server case is MOST likely used for which of the following purposes?()AUID switchBPower switchCCooling fan switchDChassis intrusion switch
单选题Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()AtracertBnetstatCnslookupDping
单选题A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()AUnmanaged switchBHardware firewallCHubDManaged switch
单选题A snatch block would most likely be used as a().Aboat fallBfairleadCriding pawlDtopping lift
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()AAESBTKIPC802.1qDISAKMP
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AES B TKIPC 802.1qD ISAKMP
单选题Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A568AB568BCCrossoverDLoopback
单选题A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()AMAC filteringBPoECIP filteringD802.1X
单选题A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()AStraightBConsoleCCrossoverDLoopback
单选题A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()ACable testerBMultimeterCLoop back plugsDCrossover cable
单选题Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()ABaseline configurationBSecurity policyCPerformance and transaction logsDPhysical network diagram
单选题Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()AIDSBVPNCNIPSDHIDS
单选题An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()ANetwork data cables are damaged.BMemory has become unseated.CThe user has defragmented the hard drive.DProcessor cooling fan is not functioning.