Skillsoft Video Tests Flashcards

Review Course Test Questions

1
Q

Which common services occur at the presentation layer of the OSI Model?

A

Encryption, Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What statement correctly characterizes the functions of the OSI Model?

A

It is a method of describing the functions of a networking system to allow communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The physical address applied by the data link layer of the OSI Model has which features?

A

It is unique to every network interface, It is a static address that can’t be changed, It is expressed using a 12-character hexadecimal value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of traffic management service occurs at the network layer of the OSI Model?

A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command can be used to determine the MTU optimal size?

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The TCP header specifies which value to ensure that data is processed by the correct application?

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocols operate at the application layer of the OSI Model?

A

SMTP, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which device or service would not operate at the physical layer of the OSI Model?

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you needed to be certain that your data transmissions are being received, which type of connection and protocol should be used?

A

Connection-orientated and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of communication would be analogous to a half duplex transmission?

A

Two people using walkie-talkies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which TCP flag is used to gracefully terminate a session between two systems?

A

FIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A fixed payload typically has which benefits or characteristics?

A

They are always the same size, They can be more efficient than variable payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A SAN would typically be implemented in which type of networking environment?

A

Enterprise-level organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a single link between system A and system B were to fail in a full mesh network with 5 nodes, how would it affect overall communications on the network?

A

All communication among all nodes would still be possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement best characterizes the route that packets will take when using multiprotocol label switching (MPLS)?

A

Dedicated or specified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A hybrid network topology is created by combining which other topologies?

A

Any combination of two or more topologies of any type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Workgroup is best described in which manner?

A

A Microsoft implementation of a peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Based on the graphic, if node 1 of this ring network topology goes down, what happens to communication on the rest of the network?

A

All nodes will lose connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which statement best characterizes the purpose and functionality of a virtual switch?

A

It allows virtual machines to communicate with the other systems on the real network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In a star network topology, by which means do systems connect to each other?

A

All systems connect to a central connection device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Satellite internet service has which primary advantage over most other types of services?

A

Global availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a bus network topology, by which means do systems connect to each other?

A

Each system connects to adjacent systems only in a linear fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The use of a smartjack provides which capabilities for a demarcation point?

A

Diagnostic and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of network provider service was available in both asynchronous and synchronous modes?

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a networking environment with a corporate headquarters, and four branch offices, how many tunnel interfaces would need to be configured so that each branch could connect to headquarters, and to each other if using multipoint generic routing encapsulation?
5
26
Which type of network would typically be used to cover very large geographical areas such as from country to country?
WAN
27
A wired network that is implemented in your home or a small office would be most appropriately categorized as which type of network?
PAN
28
Category 5 cable could also be expressed using which cable specification?
100BaseTX
29
Which type of fiber cabling would be needed to connect two data centers that are 8 km apart?
10GBASE-LR
30
Which categories of UTP cable are able to support speeds of at least 100 Mbps?
5, 5e
31
In which situations would a crossover cable be required?
Switch to Switch, PC to PC
32
Which transceiver would be required to support speeds of 10 Gbps over 4 channels?
QSFP+
33
Which optical multimode fiber specification would be the minimum required to support at least 40 Gbps speeds over distances of 100 meters?
OM3
34
An ST connector would be found on which type of cabling?
Fiber
35
The area of a patch panel where cable connections are hard-wired is referred to as what?
Punchdown Block
36
What is meant by the fact that the IP protocol is characterized as dual stack?
It refers to the fact that either version 4 or version 6 can be used to communicate
37
What is the correct range of possible addresses that can be created for the first subnet based on the expression of 192.168.0.1/26?
192.168.0.0 - 192.168.0.63
38
A subnet mask of 255.255.248.0 accommodates approximately how many hosts per subnet?
2000
39
An IPv4 address that has been assigned through the APIPA process usually indicates what condition on a network?
A DHCP server could not be found
40
Which type of transmission would be used for a client system requesting email from its messaging server?
Unicast
41
What are the benefits of using the IPv6 addressing scheme?
It provides capability for automatic configuration of IPs, It provides better routing since the size of routing tables are reduced
42
By which manner can a subinterface be created?
By assigning more that one IP address to a single physical network adapter
43
Which subnet mask will subdivide a class C network into 8 subnets?
255.255.255.224
44
Which statement best characterizes the function of network address translation?
It maps a private IP address to a public IP address, when you need to communicate with another system on the internet
45
Which address is used as the loopback address in all IPv4 configurations?
127.0.0.1
46
Which subnet mask is required to create a single network from four class C networks?
255.255.252.0
47
Which binary value represents the decimal value of 150?
10010110
48
Which statement best characterizes the purpose and functionality of a virtual IP address?
It presents a single IP address to client systems, but it represents multiple IP addresses
49
Which subnet mask in a class A network will reduce any single subnet to the size of a class C network?
255.255.255.0
50
If a network configuration is expressed by the value 192.168.0.1/24, which characteristics can be ascertained about the state of this network?
The network is a class C network, The network has not been subnetted
51
Which SSH command would be used to establish a session with a specific server using an account other than the account being used to execute the SSH command?
ssh remote_host_userID@server.example.org
52
The secure file transfer protocol runs over which other utility or protocol by default?
SSH
53
Which Syslog severity code would be used for informational messages only?
6
54
What is the default port for SMTP?
25
55
In which situation might FTP need to use a passive mode connection?
If a firewall is present on the client system
56
The IMAP protocol uses which port by default?
143
57
What is the correct configuration of the encryption keys used to secure a transaction such as ordering a product with a credit card on a website?
Private Key held by the server - Public key held by the client
58
Which primary concerns in a networking environment can be addressed by the Network Time Protocol?
Performing task sequences or applying updates, Network security
59
Which port is used to secure IMAP over SSL communications?
993
60
Which telnet command is used to open the help menu?
?
61
Which port is used to secure POP3 over SSL communications?
995
62
The SMB protocol is used primarily for which type of networking service?
Sharing resources such as files or printers
63
The POP3 protocol is used in which manner when exchanging email?
A client system receiving email from a server
64
Which characteristic of the TFTP protocol distinguishes it from FTP?
It uses UDP as the transport protocol
65
Which component of SMTP TLS refers to the fact that users can be assured that the original content of a message has not been altered during transit?
Data Integrity
66
Which HTTP messages are only included in response messages?
Status message, Status code
67
The DNS protocol resolves which types of names and/or addresses?
Ip address to domain name
68
DHCP phases in correct sequence
Discover, Offer, Request, Acknowledgement, Address allocation
69
Which component of SNMP would typically be located on a centralized server?
Manager
70
“Computername=Client1” would represent which component of the Lightweight Directory Access Protocol?
Attribute
71
Secure LDAP would most likely be used in which type of communication?
A server in a perimeter network communication with a server in your internal network
72
Which file is used to configure a database server to accept client requests using SQLnet?
listener.ora
73
The Microsoft implementation of the Structured Query Language operates over which port by default?
1433
74
Which protocol is used as an error messaging standard and can provide feedback as to the state of communications?
ICMP
75
The Remote Desktop Protocol is primarily used for which activities?
Accessing a remote system to run an application, Managing and administering a remote computer from your local computer
76
The MySQL protocol operates over which TCP port?
3306
77
Which types of applications or services make use of the Session Initiation Protocol?
Voice over IP devices, Video conferencing applications, Chat or instant messaging applications
78
What is the primary advantage of using the User Datagram Protocol over a connectionless communication channel?
Speed
79
In which portion of the DNS namespace would you find entries such as .com, .org, or .gov?
Top-Level
80
North-south traffic in a data center refers to which type of communication?
Client to server
81
The spanning-tree protocol sometimes used in the three-tier data center architecture is designed to correct which type of network traffic problem?
Looping
82
The GPS or atomic clocks used for time synchronization in the NTP protocol reside at which stratum?
0
83
Which type of DNS record is actually responsible for recording the hostname to IP address mapping?
A or AAAA
84
The DNS database for the Internet is implemented in a distributed fashion due for which basic reason?
There are too many systems on the public internet
85
The basis of software-defined networking would be most closely associated with which computing method or service?
Virtualisation
86
The authoritative server for your domain is indicated by which type of DNS record?
SOA
87
Which situation or scenario would most closely resemble the use of a colocation data center?
Renting out your current house
88
A client system might receive many of which type of DHCP message if there are several DHCP servers in your network?
Offer
89
A spine and leaf architecture in a data center can alleviate the need for which protocol?
STP
90
Which protocol would you most likely be using to access your SAN if your implementation uses only fiber-optics?
FCP
91
Which feature of the DNS protocol can enhance the speed of name resolution requests?
Caching
92
IPAM is designed to be used to manage which basic types of systems or devices?
Servers
93
A community cloud offers which primary benefits to its users?
Shared access, A collaborative environment
94
Which characteristics of multi-tenancy might be considered to be disadvantages?
Security, Performance, Compliance
95
Which risk factor is typically a primary concern in a Software as a Service implementation?
Identity management
96
Which types of services or applications would be classified as Software as a Service?
Databases, Customer management applications, Enterprise resource planning applications
97
Which type of connection to your cloud provider typically involves a dedicated connection through your telecommunications provider?
Direct Connection
98
Which types of services or applications would be classified as Infrastructure as a Service?
Virtual machines or networks, Operating systems
99
Which risk mitigation technique refers to the process of reviewing which users have or have not been able to perform a certain task, or access a certain resource?
Auditing
100
Which characteristics about a local resource such as storage are typically enhanced by switching to a cloud-based model?
Disaster recovery, Cost
101
Which statements correctly describe the model of public cloud computing?
Only pay for what you use, Security and privacy may be a concern
102
Desktop as a Service most closely resembles which type of service or application?
Remote desktop
103
A private cloud would most likely be implemented by which type of organization?
An existing company with significant resources looking to expand
104
Scalability in terms of cloud services refers to which characteristic?
The ability for a solution to have increased or decreased resources as needed
105
The Platform as a Service model is most often implemented for which type of users?
Developers
106
Which term would most accurately describe the type environment that is created by using Infrastructure as Code?
Repeatable
107
A hybrid cloud deployment refers to which type of implementation?
An organisation that has implemented both a public and a private cloud solution
108
Which statement most accurately describes elasticity in cloud computing?
Resources are allocated based on demand
109
A layer 3 switch is capable of identifying which networking components and/or able to perform which types of services beyond layer 2 switching?
IP addresses, Routing
110
In which type of organizations or institutions would you be most likely to find a SCADA system?
Factories or automation plants
111
Which routing protocol would be most accurately described as the “protocol of the internet”?
BGP
112
At which layer of the OSI model do hubs operate?
1 , Physical
113
Implementing a hosted VoIP solution would indicate that your organization does not have which components?
A PBX, An SIP server
114
IoT refers to which characteristics about a networking environment?
The ability to gather and analyse large amounts of data
115
In which type of environment would you be most likely to find an implementation of static routing?
A small to medium sized business with several routers
116
Which type of networking device is responsible for retrieving web-based content on behalf of other users?
Proxy server
117
A distance-vector protocol considers which factors when deciding on the best route for a packet?
The number of hops
118
The implementation of physical access controls in a networking environment most commonly refers to which type of system?
Door locking systems
119
Which type of firewall controls traffic based on port values?
Application-layer
120
Quality of service is designed to provide better traffic management through the use of which primary characteristic?
Prioritising applications or services
121
Which type of intrusion detection system operates based on the normal activity of your environment?
Anomaly-based
122
Which classification of router would be used to connect your organization to the internet?
Edge
123
Power over Ethernet plus (PoE+) is capable of handling what level of power?
30 watts
124
Which scenario would most accurately reflect the nature of MU-MIMO in wireless communications?
Many people on a conference call
125
Which type of resolution or mapping is performed by the Address Resolution Protocol?
IPv4 addresses to MAC addresses
126
What is the primary characteristic of 802.11 communications that determines if one variety is compatible with another?
Frequency
127
In the 2.4 GHz frequency band, which channels would not overlap with each other?
1 an 6, 6 and 11, any 5 apart
128
Which protocol or port configuration option on a switch is typically used for monitoring and diagnostic purposes?
Port mirroring
129
The Neighbor Discovery Protocol would be most accurately described in which manner?
It is the IPv6 equivalent of the Address Resolution Protocol
130
The SSID of a wireless network would be best described in which manner?
The collection of all devices connected to all access points
131
Which type of antenna could be envisioned as producing a “slice” of coverage in front of you, and a slice of coverage behind you?
Bi-directional
132
In the event of a collision on an ethernet network, CSMA/CD specifies that which process or procedure take place?
Transmitting and receiving devices should retransmit at random intervals
133
The spanning tree protocol addresses which potential issue in a networking environment?
Switching or bridging loops
134
Which statements accurately describe the nature of a MAC address?
They never change, They operate at the data-link layer of the OSI model, They are written into the code of the interface
135
In the 2.4 GHz frequency band, how many bonded pairs could be configured within the entire range?
1
136
VLANs are created and configured in which manner?
By configuring switch port interfaces
137
Which encryption standard can provide managed access through a centralized server?
WPA2
138
A voice VLAN is typically implemented for which purpose?
To give voice packets higher priority than data packets
139
Which benefits did the 2.4 GHz frequency offer over 5 GHz?
Better coverage, better penetration of obstacles
140
Which type of multiple access method is used by LTE (4G)?
OFDMA
141
Which type of networking statistic would indicate that the integrity of a packet has been compromised?
CRC errors
142
The collection of all known attributes and values on a client device using SNMP is known as what?
MIB
143
If your network monitoring consistently reveals packets that are 3000 bytes in size, which condition does that indicate?
Giants
144
When determining a baseline for your network, which methods should be used?
Gather at different times of day, Gather during both busy and slow times
145
Which percentage of service uptime would you most likely see from a reputable network service provider?
99.9%
146
Which type of agreement would typically be implemented between two organizations who are forming an initial partnership?
MOU
147
If all users within your network report that they are unable to access the internet, which networking issue would be the most likely cause?
DNS
148
At which phase of an incident response plan would you detail the severity, priority, and root cause of a problem?
Investigation
149
Which type of network documentation or diagram would indicate the means by which your building is wired?
MDF/IDF
150
The space between two racks that are rear facing each other is typically referred to in which manner?
Hot aisle
151
Which type of policy deals with attempting to ensure that confidential information is not leaked outside of your organization?
Data loss prevention
152
Which type of network logging is primarily concerned with security-based events such as resource access?
Audit
153
The process of Netflow intervening to produce an output for analysis is known as what?
Active Timeout
154
Which value provides an indication of how reliable your equipment or services have been over time?
MTBF (Mean Time Between Failures)
155
Which types of backup would you implement when you are more concerned with the configuration of a server rather than the data?
Bare Metal
156
Which feature is almost always an advantage of clustering that might not be a feature of redundancy?
Automatic Recovery from failure
157
Which type of UPS should be implemented if you require the highest levels of reliability and the cleanest type of power?
Double Conversion
158
Which method of dynamic multipathing directs traffic based on specified values as defined by an administrator?
Priority
159
Which method of load balancing works based on sequentially directing requests to a group of servers?
Round Robin
160
Which NIC teaming configuration would be required if you want to provide both fault tolerance and load balancing?
Active/Active
161
Which mitigation technique is most capable of defeating a ransomware attack?
Performing regular backups
162
Which type of password attack works on the assumption that a weak password is being used within an organization?
Password Spraying
163
In the CIA triad, integrity refers to which aspect of information protection?
Ensuring the original version is not modified
164
Which type of Denial-of-Service attack is based on fragmented packets that cannot be reassembled?
Teardrop
165
Which common technology-based attack presents a false wireless network to users?
Evil twin
166
Security cameras would be considered which type of control in the defence-in-depth model?
Physical
167
Which approach to implementing the principle of least privilege grants only the necessary level of access, only when it is necessary?
Just-in-time privileges
168
A zero-day vulnerability is characterized by which aspect or component?
They have no current patch or fix
169
Which authentication method is based on using keys and tickets?
Kerberos
170
When or where would you be most likely to encounter a default password?
On a router or a firewall
171
Which component of role-based access control gives a user the abilities of a role?
Management role assignment
172
Which type of malware is capable of self-propagation and is most commonly spread via email?
Worm
173
Which statements correctly characterize vulnerability assessments and penetration tests?
A penetration test attempts to breach your security, Vulnerability assessments are generally performed to gather information only
174
Security Information and Event Management applications would be analogous to which type of operation or process?
Writing records to an operational database and querying a data warehouse simultaneously
175
Which statement or scenario best describes the zero-trust security model?
No one should be trusted
176
Leaving a flash drive labelled “Confidential” that actually contains malware, in an easily found location would be classified as which type of social engineering?
Baiting
177
Which mitigation technique can be used to enhance the security of your email by ensuring that only the intended recipient can access a message, and be assured that the message was not altered?
S/MIME (Secure/Multipurpose internet Mail Extensions)
178
Which type of external attack is implemented by targeting a specific user or organization with social engineering tactics?
Spear Phishing
179
Out-of-band management refers to which process?
Implementing redundancy to allow for continued network management in the event of a failure
180
Which wireless authentication method implements two-way or mutual authentication between client and access point?
EAP-TLS (Extensible Authentication Protocol - Transport Layer Security)
181
Which type of wireless security configuration allows you to create two separate networks on the same access point?
Guest Network
182
Shining a laser or a bright flashlight directly into a security camera would be classified as which type of interference?
Defocusing
183
Which feature of a security camera refers to its ability to store data locally?
DVR
184
Network hardening features such as Router Advertisement Guard and DHCP Snooping are implemented where?
Switches
185
describe a situation where the Remote Desktop Protocol should be used?
When administering a Windows server from a client computer
186
Which statement correctly describes the level of security provided by passwords in a networking environment
They are a primary security vulnerability
187
Which encryption algorithm is used by default with the WPA2 protocol?
AES (Advanced Encryption Standard)
188
Which type of VPN configuration would be more suitable for a connection between two offices that will be used frequently by multiple users?
Site-to-Site
189
In addition to performing remote administration tasks, VNC can be useful for which other purpose in a networking environment?
Training
190
Which feature of the Windows Firewall can also implement encryption using IPSec?
Connection security rules
191
Which encryption algorithm could be used to configure WPA in a mode that is compatible with WEP?
TKIP-RC4
192
Which remote authentication and authorization protocol is not considered to be secure due to its use of clear-text passwords?
PAP
193
Which value of an asset tag or inventory record indicates how urgently a device should be replaced?
Recovery Priority
194
Which type of wireless transmission would not be able to support an implementation of geofencing?
Bluetooth
195
In which type of security system would you be most likely to encounter the use of smart cards?
Door-locking systems
196
Which statement correctly characterizes why an IoT implementation poses more of a security threat to an environment?
There are far more devices, therefore far more points of attack
197
Which type of firewall action would be used if you only wanted to assess the type of traffic on your network?
Log only
198
Which statement correctly describes a situation where the Secure Shell protocol should be used?
When establishing a remote session to a Unix server
199
Which statements correctly characterize the differences between throughput and bandwidth?
Bandwidth is the measure of how much data can theoretically be transferred, Throughput is the measure of how much data is actually being transferred, The measure of bandwidth does not change without changing your equipment
200
After verifying that system functionality has been restored after implementing your solution, which additional steps should be taken?
Implement preventative measures to reduce the chance of the problem reoccurring
201
Which type of data transmission issue can be caused by strong sources of power, magnetism, or radio?
Interference
202
If the network adapter of a specific computer is set to half duplex to support a legacy application, which settings would be acceptable on the other system with which is it communicating?
Half Duplex, Auto Negotiate
203
Documentation of the history of a problem should include which items?
The Outcome, The symptoms that were exhibited, The corrective actions taken
204
Escalation of an issue refers to which approach?
Reporting a problem to the closest level of support first, then moving up from there
205
Which type of cabling should be used when connecting a computer to a switch?
Straight-Through
206
Which type of network transmission issue may be indicative of a short in your cabling system?
Collisions
207
Which type of network cabling typically needs to be installed when running cables between a suspended ceiling and the permanent ceiling?
Plenum
208
Establishing a theory of the most probable cause of an issue should involve which steps?
Creating a prioritised list of causes, Questioning users
209
Damaged or bent pins will most likely result in which types of network communication issues?
Loss of service, Intermittent connectivity
210
Which system configuration settings and/or properties can help to reduce bottlenecks on your network?
Use auto-negotiate on adapters, Ensure adequate processing and memory
211
Implementing a troubleshooting methodology should begin with which step?
Identifying the problem
212
Which primary mitigation techniques should be implemented to help prevent crosstalk?
Install the cables farther apart from each other, Use shielded cable instead of unshielded
213
When a network adapter is connected and communicating normally, what would you most likely see from the LED status light indicator?
Solid green light that flashes rapidly and randomly
214
Which testing tool can help you to identify where a wall port connection terminates at the patch panel end?
Tone Generator
215
Identifying the potential impact of a plan of action refers to which possibility upon implementation?
That the plan may have unforeseen repercussions
216
A scenario whereby packets are leaving your network through one route, indicates which type of issue?
Asymmetric routing
217
Installing an antenna in a vertical or upright position as opposed to a horizontal position is an implementation of which characteristic of wireless transmissions?
Polarisation
218
Which port scanning technique attempts to fool a target system into believing communications have been occurring by sending an indication that the conversation has ended?
FIN scan
219
Which values would indicate that your netmask has been entered or calculated correctly?
255.0.0.0, 255.255.0.0, 255.255.255.0
220
If the DHCP scope being used for guest access in the lobby of a hotel is continually running out of IP addresses, what is the most likely cause?
The lease duration is too long
221
If you discover that a service has become unresponsive, and its state is set to automatic, by which methods could the service be reset?
Restart the service, Reboot the server
222
Effective Isotropic Radiated Power refers to which characteristic of wireless transmission?
The strength of transmission emanating from the antenna
223
In a wireless network, which factor would likely have the most noticeable effect on the available bandwidth of a connection?
Distance
224
Which implementation can be configured on your switches to prevent the implementation of a rogue DHCP server?
DHCP Snooping
225
Which Linux utility would be the best option to use to help troubleshoot issues with the DNS service?
dig
226
Which utility is most effective at diagnosing issues with the DNS service?
Nslookup
227
When troubleshooting the configuration of a firewall, which values would you expect to see configured for any entries in the Access Control List?
Zone, Source and destination IP addresses, Interface on which a rule is placed
228
Your wireless network has grown significantly and all devices have been upgraded to their newest models. Previous tests have revealed that your primary issues with connectivity are slow speeds, high interference, and the use of overlapping channels. Which solution might best address all of these concerns?
Switch from the 2.4Ghz band to the 5 Ghz band
229
If your IP address configuration does not include a value for the default gateway, but your address and netmask are correct, which connectivity scenarios will occur?
You will only be able to connect to devices on your network, You will not be able to connect to the internet
230
If you plug an ethernet cable into the network adapter of your computer and the LED status light does not activate, what is the most likely cause?
Damaged cable
231
If the certificate on a server seems to be intact, but the server that issued the certificate in the first place cannot be verified, how would this error be classified?
Missing Chain Certificate
232
Which utility would be the best option to help determine which IP address is currently mapped to any given MAC address?
ARP
233
Which statement most accurately characterizes the likelihood of a MAC address conflict in a network?
They are very rare
234
A Wi-Fi analyzer would not be effective in determining which characteristic of a wireless network implementation?
The security settings to use
235
Which utility would be the best option to use when trying to determine the maximum bandwidth specifications of applications using either the TCP or the UDP transport protocol?
iperf
236
A packet sniffer might be used in which situations?
Classifying traffic, Identify if weak passwords are being used