Which Two Devices Are Commonly Powered By Poe Choose Two

1. A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)

web server

switch*

router*

email server

wireless access point*

print server

2. Which two devices are commonly powered by PoE? (Choose two.)

access point*

core switch

IP phone*

modular switch

router

3. Which two types of signal interference are reduced more by STP than by UTP? (Choose two.)

RFI*

white noise

MDF

dispersion

EMI*

4. When would a printer be considered a network host?

when it is connected to a switch*

when it is connected to a workstation

when it is connected to a laptop

when it is connected to a PC

5. Which technology is most often used to connect devices to a PAN?

coaxial cabling

Bluetooth*

fiber optic cabling

IEEE 802.11n wireless

6. A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?

STP

coaxial

fiber optic*

UTP

7. How many devices can a Bluetooth device connect to simultaneously?

127

7*

10

24

5

8. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

repeater

hub

switch*

router

9. What is a common function of a proxy server?

to store frequently accessed web pages on the internal network*

to control who is permitted to access the internal network

to detect malicious signatures by monitoring traffic that is entering the internal network

to provide access to a shared pool of configurable computing resources

10. What is a characteristic of a WAN?

It connects multiple networks that are geographically separated.*

It spans across a campus or city to enable sharing of regional resources.

It is typically owned and managed by a single home or business.

It requires a wireless access point to connect users to the network.

11. What is the correct order of the layers of the TCP/IP model from the top layer to the bottom?

application, session, network, data link, physical

application, internet, network access, transport

network access, transport, internet, application

application, transport, internet, network access*

12. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?

11n*

11g

11b

11a

13. Which pairs of wires change termination order between the 568A and 568B standards?

green and orange*

green and brown

blue and brown

brown and orange

14. Which device provides wireless connectivity to users as its primary function?

switch

router

access point*

modem

Refer to more articles:  Which University In Usa Has Most Indian Students

15. Which type of connection to the Internet is capable of the fastest transfer rates?

ISDN

POTS

satellite

cable

fiber*

16. A user needs to access the Internet from home. Which device is needed if a user connects to an ISP through the telephone network?

switch

server

DSL modem*

wireless access point

17. Which well-known port number is used by the DHCP (client) protocol?

67

68*

20

80

53

18. A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the destination MAC address of the technician PC.

The data flow is being tracked based on the source port number that is used by each application.*

The data flow is being tracked based on the source IP address that is used by the PC of the technician.

The data flow is being tracked based on the destination IP address that is used by the PC of the technician.

19. Which type of server would be used to keep a historical record of messages from monitored network devices?

DHCP

DNS

print

authentication

syslog*

20. Which network device would be the most appropriate to provide stateful packet filtering, email filtering, and VPN services?

router

endpoint management server

proxy server

UTM*

TPM

21. Which smart home wireless technology has an open standard that allows up to 232 devices to be connected?

11ac

11n

Z-Wave*

Zigbee

22. Which network device allows administrators to remotely manage many devices through one dashboard interface?

cloud-based network controller*

Power over Ethernet

switch that supports VLANs

powerline networking

23. Which internet connection type is an always-on service that uses radio signals sent from a tower to a receiver in a home or business?

line of sight wireless*

satellite

hotspot

cellular

24. Which type of server would support the SMTP, POP, and IMAP protocols?

DHCP

email*

proxy

syslog

25. A client packet is received by a server. The packet has a destination port number of 21. What service application is the client requesting?

FTP*

LDAP

SLP

SNMP

26. A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?

NetBIOS (NetBT)*

SMB/CIFS

HTTPS

SLP

27. A client packet is received by a server. The packet has a destination port number of 22. What service application is the client requesting?

SSH*

SMB/CIFS

HTTPS

SLP

28. A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting?

IMAP*

SMB/CIFS

HTTPS

SLP

29. A client packet is received by a server. The packet has a destination port number of 161. What service application is the client requesting?

SNMP*

SMB/CIFS

HTTPS

SLP

30. A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?

Refer to more articles:  Which Of The Following Is Not True About Deep Learning

Telnet*

SMB/CIFS

HTTPS

SLP

31. A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?

LDAP*

SMB/CIFS

HTTPS

SLP

32. A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?

SMTP*

SMB/CIFS

HTTPS

SLP

33. A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?

LDAP*

POP3

HTTP

NetBIOS (NetBT)

34. A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting?

DNS*

NetBIOS (NetBT)

POP3

IMAP

35. A technician is searching through a storage locker and finds a PoE injector. What is the purpose of this device?

It is a device that can be inserted in the middle of a cable run to add power.*

It is a device that allows a network administrator to manage many remote networking devices from a central location.

It connects the network of a user to the digital infrastructure of a phone company, providing always-on service.

It connects a home or business network to a company that provides internet connectivity as well as television signals.

36. A technician is searching through a storage locker and finds a managed switch. What is the purpose of this device?

It connects multiple end devices and can be configured for VLANs and port security.*

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

It is placed between two or more networks and protects data and equipment from unauthorized access.

37. A technician is searching through a storage locker and finds a Powerline networking connector. What is the purpose of this device?

It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.*

It is placed between two or more networks and protects data and equipment from unauthorized access.

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

It connects networks and forwards traffic to remote networks by using IP addressing information.

38. A technician is searching through a storage locker and finds a cable modem. What is the purpose of this device?

It connects a home or business network to a company that provides internet connectivity as well as television signals.*

It is placed between two or more networks and protects data and equipment from unauthorized access.

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

It connects networks and forwards traffic to remote networks by using IP addressing information.

39. A technician is searching through a storage locker and finds an unmanaged switch. What is the purpose of this device?

It is a device whose sole purpose is to connect end devices and to microsegment a LAN.*

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

Refer to more articles:  Which The Owl House Character Are You

It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

It is placed between two or more networks and protects data and equipment from unauthorized access.

40. A technician is searching through a storage locker and finds a DSL modem. What is the purpose of this device?

It connects the network of a user to the digital infrastructure of a phone company, providing always-on service.*

It is placed between two or more networks and protects data and equipment from unauthorized access.

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

It connects networks and forwards traffic to remote networks by using IP addressing information.

41. A technician is searching through a storage locker and finds an access point. What is the purpose of this device?

It uses radio waves to provide network access to wireless devices.*

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

It is placed between two or more networks and protects data and equipment from unauthorized access.

42. A technician is searching through a storage locker and finds a router. What is the purpose of this device?

It connects networks and forwards traffic to remote networks by using IP addressing information.*

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

It is placed between two or more networks and protects data and equipment from unauthorized access.

43. A technician is searching through a storage locker and finds a cloud-based network controller. What is the purpose of this device?

It is a device that allows a network administrator to manage many remote networking devices from a central location.*

It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as wireless access points and

surveillance cameras.

It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

It is a device that can be inserted in the middle of a cable run to add power.

44. A technician is searching through a storage locker and finds a firewall. What is the purpose of this device?

It is placed between two or more networks and protects data and equipment from unauthorized access.*

It is a device that can be inserted in the middle of a cable run to add power.

It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as wireless access points and surveillance cameras.

It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.

Related Posts

Which Zodiac Sign Is The Oldest

Which Zodiac Sign Is The Oldest

The Ancient Greeks — along with other civilizations of the time — widely believed in a now-iconic phrase: “As Above, So Below.” In other words, the Greeks…

Which Of The Following Is A Characteristic Of Beta

What Is Beta? Beta is a measure of a stock’s volatility in relation to the overall market. By definition, the market, such as the S&P 500 Index,…

Which Is Better Graphite Or Fiberglass Pickleball Paddle

Fiberglass vs Graphite Pickleball Paddle The pickleball arena resonates with the constant buzz of energetic gameplay and the clink of paddles. Among the myriad of considerations for…

Which Of The Following Best Describes The Paintbox Era

The Hay Wain, Study Artist: John ConstableYou may be interested Which Of The Following Is The Best Thermal Conductor Which Category Best Fits The Words In List…

Which Of The Following Is A Transition Element

Which Of The Following Is A Transition Element

Table of Content What are Transition Elements?Electronic Configuration of Transition ElementsGeneral Properties of Transition ElementsAtomic Ionic RadiiIonization EnthalpyFrequently Asked QuestionsYou may be interested Which Of The Following…

Which Of The Following Foods Is Not Made By Fermentation

( newcommand{vecs}[1]{overset { scriptstyle rightharpoonup} {mathbf{#1}} } )You may be interested Which Of The Following Is Not A Typical Crm Metric Which Playboy Magazine Is Worth The…