A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the first question the help desk asks?
A. Does the printer have toner?
B. Are there any errors on the printer display?
C. Is the user able to access any network resources?
D. Is the printer powered up?
Jazzy is a network administrator performing a crucial upgrade to the network. What should she implement in case the upgrade fails?
A. Redundant servers
B. Education plan
C. Reduction plan
D. Rollback plan
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?
B. Helper addresses
Your company has just installed a packet sniffer on the network. The sniffer discovers that client a is sending TCP SYN packets to server B. What packet will server B return?
Mikey, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the internet and internal company servers? (Select three).
A. Default gateway
B. Subnet mask
D. TFTP server
E. Lease expiration time of 1 day
F. DNS servers
You're a project manager for a huge construction company. You will be running network cables through the ceiling of several areas of the construction site. What type of cabling should you use in these areas?
A. CAT 5 E
B. CAT 5
C. CAT 6
D. CAT 7
E. Plenum rated cabling
Jake is a senior network engineer that works for Sally inc. He is explaining how private IP addresses are turned into public IP addresses. This process is referred to as what?
How many hosts per subnet can you get from the network 172.22.0.0 255.255.255.240?
A. 16 subnets
B. 14 hosts
C. 40 subnets
D. non calculated
Katie enters her username and password once. She has access to several applications on the network without having to reenter her credentials. What is this an example of?
A. Single Sign On
B. Multi-factor Authentication