What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user? adware pop-ups spyware pop-unders Answers Explanation…

Continue ReadingWhat type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

What is the primary means for mitigating virus and Trojan horse attacks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the primary means for mitigating virus and Trojan horse attacks? antivirus software encryption antisniffer software blocking ICMP echo and echo-replies Answers Explanation & Hints: Antivirus software is the…

Continue ReadingWhat is the primary means for mitigating virus and Trojan horse attacks?

What technology enables a cell phone to be used as a hands-free device?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What technology enables a cell phone to be used as a hands-free device? Wi-Fi Bluetooth 4G Yosemite Answers Explanation & Hints: Bluetooth provides a way to connect wireless devices, such…

Continue ReadingWhat technology enables a cell phone to be used as a hands-free device?

What would a technician require in order to install a hypervisor on a client machine?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What would a technician require in order to install a hypervisor on a client machine? an SSD multiple storage drives a server housed by a cloud service provider virtualization software…

Continue ReadingWhat would a technician require in order to install a hypervisor on a client machine?

Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth? ADSL SDSL CDMA TDMA Answers Explanation & Hints: ADSL provides higher downstream bandwidth to the user than…

Continue ReadingWhich DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?

Which type of wireless communication is based on 802.11 standards?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of wireless communication is based on 802.11 standards? Wi-Fi Cellular WAN Bluetooth Infrared Answers Explanation & Hints: The IEEE 802.11 standards define Wi-Fi wireless LAN specifications.

Continue ReadingWhich type of wireless communication is based on 802.11 standards?

Which type of network technology is used for low-speed communication between peripheral devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of network technology is used for low-speed communication between peripheral devices? Bluetooth Ethernet 802.11 channels Answers Explanation & Hints: Bluetooth is a wireless technology that uses the 2.4…

Continue ReadingWhich type of network technology is used for low-speed communication between peripheral devices?

What are three private IPv4 address? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are three private IPv4 address? (Choose three.) 10.1.1.1 172.32.5.2 192.167.10.10 172.16.4.4 192.168.5.5 224.6.6.6 Answers Explanation & Hints: Private IP addresses are reserved to be exclusively used for internal networks…

Continue ReadingWhat are three private IPv4 address? (Choose three.)

Which network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask? 172.32.65.0 172.32.65.32 172.32.0.0 172.32.32.0 Answers Explanation & Hints: In classful IPv4…

Continue ReadingWhich network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask?

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates…

Continue ReadingA network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

In implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.) It provides increased security. Only LAN…

Continue ReadingIn implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.)

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?…

Continue ReadingA router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?

Which network device can serve as a boundary to divide a Layer 2 broadcast domain?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which network device can serve as a boundary to divide a Layer 2 broadcast domain? router Ethernet bridge Ethernet hub access point Answers Explanation & Hints: Layer 1 and 2…

Continue ReadingWhich network device can serve as a boundary to divide a Layer 2 broadcast domain?

Which three fields are found in an 802.3 Ethernet frame? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which three fields are found in an 802.3 Ethernet frame? (Choose three.) source physical address source logical address media type identifier frame check sequence destination physical address destination logical address…

Continue ReadingWhich three fields are found in an 802.3 Ethernet frame? (Choose three.)

Which two layers of the OSI model specify protocols that are associated with Ethernet standards? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two layers of the OSI model specify protocols that are associated with Ethernet standards? (Choose two.) physical layer data link layer network layer transport layer session layer Answers Explanation…

Continue ReadingWhich two layers of the OSI model specify protocols that are associated with Ethernet standards? (Choose two.)

A network administrator would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path? tracert 192.168.1.1 ping…

Continue ReadingA network administrator would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path?