MultipleChoice
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports?
OptionsMultipleChoice
The /cat/etc/passwd file on a client computer contains the following entry:
Martha:x:::::bin/false
Which of the following is true for Martha?
OptionsMultipleChoice
Which of the following is not an encryption technology?
OptionsMultipleChoice
Which of the following statements regarding Secure Sockets Layer (SSL) are true?
Each correct answer represents a complete solution. Choose all that apply.
OptionsMultipleChoice
Which of the following terms refers to manual assignment of IP addresses to computers and devices?
OptionsMultipleChoice
You have a customer who wants to put wireless internet in his remote cabin. The cabin is many miles from any other building with internet connectivity or access points. What should you recommend?
OptionsMultipleChoice
What is the maximum cable segment length supported by a 10BaseT network?
OptionsMultipleChoice
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration?
Each correct answer represents a part of the solution. Choose two.
OptionsMultipleChoice
Which of the following frequencies are used by wireless standard 802.11n to operate?
Each correct answer represents a complete solution. Choose two.
OptionsMultipleChoice
Which of the following terms describes software technologies that improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed?
Options