单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()ACreate a new VLAN for the out-of-range users.BAdd a wireless access point for the out-of-range users.CUpgrade the out-of-range users’ SSID searching software.DEnable network sharing on the users’ computers that are within range.

单选题
Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()
A

Create a new VLAN for the out-of-range users.

B

Add a wireless access point for the out-of-range users.

C

Upgrade the out-of-range users’ SSID searching software.

D

Enable network sharing on the users’ computers that are within range.


参考解析

解析: 暂无解析

相关考题:

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()A. Circuit switchingB. Network address translationC. Power over EthernetD. Virtual servers

Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?() A. Network diagramB. Performance baselineC. Network security procedureD. Company policy

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

Which of the following should an administrator do after running a command from the console onthe perimeter router?() A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline

An engineer is preparing an implementation plan in which the configuration needs to influence BGP‘s choice of best path.Which of the following is least likely to be used by the configuration in this imple mentation plan?()A. WeightB. Origin codeC. AS_PathD. Local_Pref

Which of the following statements is true about the 80/20 rule (Select all that apply)?()A、20 percent of the traffic on a network segment should be local.B、no more than 20 percent of the network traffic should be able to move across a backbone.C、no more than 80 percent of the network traffic should be able to move across a backbone.D、80 percent of the traffic on a network segment should be local.

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()A、Circuit switchingB、Network address translationC、Power over EthernetD、Virtual servers

A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A、Frequency settings should be changedB、Additional WAPs should be installedC、Channels should be changedD、VLANs should be added

A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path

An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()A、WeightB、Origin codeC、AS_PathD、Local_Pref

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

The warranty expiration date of each server should be recorded in which of the following documents?()A、Asset managementB、Network diagramC、Server baselineD、List of vendors

An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?() A、SNATB、SNAPC、NACD、MPLS

A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()A、Printer driverB、Protocol stackC、Network connectivityD、Correct patch application

Which of the following options best justifies why a DNS server should be run in a large network system?()A、To use ftp and telnetB、To perform NFS mountsC、To make /etc/hosts files unnecessaryD、To reduce network traffic and save bandwidth

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune

单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat

单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP

单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()AUpdate the configuration logsBUpdate the network wiring schematicsCUpdate the network configuration proceduresDCompare the configuration with the baseline

单选题A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()ACircuit switchingBNetwork address translationCPower over EthernetDVirtual servers

单选题Which of the following should be used to restrict access to a wireless network?()APort forwardingBEnable SSID broadcastCWireless encryptionDEnable DMZ

多选题Which of the following statements is true about the 80/20 rule (Select all that apply)?()A20 percent of the traffic on a network segment should be local.Bno more than 20 percent of the network traffic should be able to move across a backbone.Cno more than 80 percent of the network traffic should be able to move across a backbone.D80 percent of the traffic on a network segment should be local.

单选题Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A noB nfsoC vmtuneD exportfs