1.
QUESTION NO: 251
Which of the following is the point when local exchange carrier responsibility ends?
Correct Answer
A. Demarc
Explanation
The point when local exchange carrier responsibility ends is known as the demarcation point or "demarc" for short. This is the point where the responsibility for the telephone or data line transitions from the service provider to the customer. At the demarc, the service provider's network ends and the customer's internal wiring begins. It is typically marked by a physical device or connection point where the service provider's line terminates and the customer's equipment is connected.
2.
QUESTION NO: 252
A company would like to configure newsfeeds on the network for employees to be aware of internal company information. Which of the following ports would be used to allow news feeds to pass-through?
Correct Answer
C. 119
Explanation
Port 119 is the correct answer because it is the standard port used for Network News Transfer Protocol (NNTP), which is commonly used for news feeds. This port allows news articles and updates to be transmitted and received by clients, such as newsreader applications, allowing employees to stay informed about internal company information. Ports 25, 22, and 143 are used for other purposes such as email (SMTP), SSH (Secure Shell), and IMAP (Internet Message Access Protocol), respectively, and are not specifically designed for news feeds.
3.
QUESTION NO: 253
A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections?
Correct Answer
C. Toner probe
Explanation
A toner probe is used to locate the positions in the cross connections between 66 blocks. It is a tool that consists of a tone generator and a probe. The tone generator is connected to the telephone line at one end, and the probe is used to trace the tone on the other end. By using the toner probe, the technician can identify the specific cross connection point on the 66 block where the telephone is located.
4.
QUESTION NO: 254
Which of the following commands would allow the technician to identify the currently assigned DNS server?
Correct Answer
D. Nslookup
Explanation
The nslookup command is used to query DNS servers and retrieve information about domain names, including the currently assigned DNS server. It allows the technician to identify the IP address of the DNS server that is currently being used for DNS resolution. This information can be helpful in troubleshooting network connectivity or DNS-related issues.
5.
QUESTION NO: 255
Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called:
Correct Answer
B. Trunking
Explanation
Trunking is the advanced switch feature that allows two ports on switch A to be combined and managed as a single entity. Trunking enables the transmission of multiple VLANs over a single physical link, increasing network efficiency and reducing the number of required physical connections. This feature is commonly used in larger networks where there is a need to consolidate and manage multiple connections between switches.
6.
QUESTION NO: 256
Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?
Correct Answer
B. 802. 11a
Explanation
The correct answer is 802.11a. This standard has a maximum bandwidth of 54Mbps and operates at 5GHz. 802.11g has a maximum bandwidth of 54Mbps but operates at 2.4GHz. 802.11b has a maximum bandwidth of 11Mbps and also operates at 2.4GHz. 802.11 is a general term that encompasses all the different IEEE standards for wireless networking.
7.
QUESTION NO: 257
Which of the following is the recommended maximum distance CAT6 cable should be run?
Correct Answer
C. 328 feet (100 meters)
Explanation
The recommended maximum distance that CAT6 cable should be run is 328 feet (100 meters). This is because CAT6 cable is designed to support higher bandwidth and faster data transmission compared to previous versions of Ethernet cable. Beyond this recommended distance, there may be a decrease in signal quality and potential for data loss or interference. Therefore, it is important to adhere to this maximum distance guideline to ensure optimal performance of the CAT6 cable.
8.
QUESTION NO: 258
A user calls saying they are having issues connecting to the Intenet, but they are able to connect to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address?
Correct Answer
C. Arp-a
Explanation
The correct answer is "arp-a". The "arp-a" command is used to display the ARP (Address Resolution Protocol) cache, which contains the mappings of IP addresses to MAC addresses. By using this command, the user can verify if their device has the correct MAC address for the default gateway or any other network device. This can help troubleshoot connectivity issues by ensuring that the device is communicating with the correct network devices.
9.
QUESTION NO: 259
Which of the following is a utility that translates the physical network address to its IP address?
Correct Answer
C. Rarp
Explanation
RARP (Reverse Address Resolution Protocol) is a utility that translates the physical network address to its IP address. It is used to find the IP address of a device when only the physical address (MAC address) is known. RARP is the opposite of ARP (Address Resolution Protocol), which translates IP addresses to physical addresses. Therefore, the correct answer is RARP.
10.
QUESTION NO: 260
Which of the following cable standards has the highest effective range at a greater expense?
Correct Answer
B. IOOOBase-LX
Explanation
IOOOBase-LX is the correct answer because it has the highest effective range compared to the other cable standards mentioned. It is a fiber optic cable standard that can transmit data up to 10 kilometers, whereas the other cable standards have shorter ranges. However, IOOOBase-LX is more expensive than the other options, making it a trade-off between cost and range.
11.
QUESTION NO: 261
Which of the following technologies is BEST suited for a point-to-point circuit that is 6 kilometers (3 .7 miles) in distance?
Correct Answer
D. LOGBase-LR
Explanation
The best technology suited for a point-to-point circuit that is 6 kilometers in distance is lOGBase-LR. This technology is designed for long-range connections, making it suitable for the given distance. lOGBase-T is for short-range connections, lOGBase-ER is for extended-range connections, and lOGBase-SR is for short-range connections over fiber optics.
12.
QUESTION NO: 262
Which of the following frequency ranges does 802.11a operate at?
Correct Answer
B. 5GHz
Explanation
802.11a operates at the frequency range of 5GHz. This frequency range allows for faster data transmission and reduces interference from other devices that operate on the 2.4GHz frequency range, such as cordless phones and microwaves. The higher frequency also allows for more channels to be available, which increases the overall capacity and performance of the wireless network.
13.
QUESTION NO: 263
Which of the following protocols provides the actual encryption used over VPN?
Correct Answer
C. PPTP
Explanation
PPTP (Point-to-Point Tunneling Protocol) is the correct answer because it provides the actual encryption used over VPN. PPTP creates a secure tunnel between the client and the server, encrypting the data that is transmitted over the VPN connection. PPP (Point-to-Point Protocol) is a data link protocol but does not provide encryption. HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over a network, but it is not specific to VPN encryption. SSH (Secure Shell) is a cryptographic network protocol used for secure remote access, but it is not specific to VPN encryption.
14.
QUESTION NO: 264
Which of the following features of a switch will allow two switches to pass network infonnation?
Correct Answer
C. Trunking
Explanation
Trunking is a feature of a switch that allows two switches to pass network information. Trunking is used to combine multiple network connections into a single logical connection, which increases bandwidth and efficiency. It allows for the transmission of multiple VLANs (Virtual Local Area Networks) over a single physical link, enabling switches to exchange network information and communicate with each other effectively. Disabling routing protocols, port speeds, and PoE (Power over Ethernet) are not directly related to the ability of switches to pass network information.
15.
QUESTION NO: 265
Which of the following tools can send a signal down a cable and measure how long it takes to comeback?
Correct Answer
C. TDR
Explanation
A Time Domain Reflectometer (TDR) is a tool that can send a signal down a cable and measure how long it takes to come back. This is done by sending an electrical pulse down the cable and analyzing the reflections that occur when the pulse encounters impedance mismatches or faults in the cable. By measuring the time it takes for the reflections to return, the TDR can determine the length of the cable and locate any faults or discontinuities.
16.
QUESTION NO: 266
A technician needs to connect a laptop via the small office, home office (SOHO)wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?
Correct Answer
A. The SSID is set to not broadcast.
Explanation
The reason for the issue could be that the SSID (Service Set Identifier) is set to not broadcast. This means that the wireless network's name is hidden and not visible during a site survey. Even though the wireless card on the laptop is working, it cannot detect the network because it is not broadcasting its SSID.
17.
QUESTION NO: 267
A technician has determined that a single computer has suddenly lost network connectivity. Which of the following should be the next troubleshooting step the technician should take?
Correct Answer
B. Determine if anything has changed.
Explanation
The next troubleshooting step the technician should take is to determine if anything has changed. This is because sudden loss of network connectivity can often be attributed to recent changes in the computer's configuration or network settings. By identifying any recent changes, the technician can narrow down the potential causes of the issue and focus their troubleshooting efforts more effectively.
18.
QUESTION NO: 268
A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna.
Which of the following would BEST improve the link perfonnance?
Correct Answer
A. Replace the omni-directional antennas with Yagi antennas.
Explanation
Replacing the omni-directional antennas with Yagi antennas would be the best solution to improve the link performance. Yagi antennas are directional antennas that focus the signal in a specific direction, allowing for a stronger and more focused connection between the two buildings. This would help to reduce interference and increase the throughput across the link.
19.
QUESTION NO: 269
A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?
Correct Answer
B. The workstation is configured with the incorrect default gateway.
Explanation
The most likely cause of the problem is that the workstation is configured with the incorrect default gateway. The default gateway is the IP address of the router that connects the local subnet to other subnets. If the workstation has the wrong default gateway configured, it will not be able to send packets to other subnets, resulting in the inability to ping addresses on other subnets.
20.
QUESTION NO: 270
The 66 block termination point is:
Correct Answer
A. CAT3 compliant.
Explanation
The 66 block termination point is CAT3 compliant. This means that it is designed to handle and support CAT3 cables, which are commonly used for voice and data transmission in telecommunications and networking applications. CAT3 cables have a maximum data transfer rate of 10 Mbps and are suitable for applications such as telephone systems and Ethernet networks.
21.
QUESTION NO: 271
A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to improve convergence time?
Correct Answer
D. Replace RIP with alink-state routing protocol such as OSPF.
Explanation
Replacing RIP with a link-state routing protocol such as OSPF would improve convergence time in the network. Link-state routing protocols use a more efficient and accurate method of exchanging routing information, which allows them to quickly adapt to changes in the network topology. This means that when a piece of equipment fails, OSPF would be able to identify the failure and reroute traffic much faster than RIP.
22.
QUESTION NO: 272
Which of the following devices is used to connect a WAN to a LAN?
Correct Answer
A. Basic router
Explanation
A basic router is used to connect a wide area network (WAN) to a local area network (LAN). Routers are networking devices that forward data packets between networks, allowing devices on different networks to communicate with each other. In this case, the basic router would be used to connect the LAN to the WAN, enabling devices on the LAN to access the resources and services available on the WAN.
23.
QUESTION NO: 273
Routing convergence time is which of the following?
Correct Answer
D. Time required by protocols to update their forwarding tables after changes have occured
Explanation
The correct answer is "Time required by protocols to update their forwarding tables after changes have occurred." Routing convergence time refers to the time it takes for routing protocols to update their forwarding tables after changes have occurred in the network. This includes updating routes, calculating new paths, and redistributing this information to other routers in the network. It is an important factor in network performance and can affect the overall efficiency and stability of the network.
24.
QUESTION NO: 274
A new business with five computers moves into an office where coaxial cable exists. In order to use the existing infrastucture, which of the following topologies would be used?
Correct Answer
D. Bus
Explanation
In order to use the existing coaxial cable infrastructure, the most suitable topology would be the Bus topology. In a Bus topology, all devices are connected to a single cable, which acts as a shared communication medium. Each device can transmit data onto the cable, and all other devices on the network can receive that data. This topology is cost-effective and easy to install, making it a good choice for a small business with existing coaxial cable infrastructure.
25.
QUESTION NO: 275
A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones?
Correct Answer
B. PoE
Explanation
When selecting a new switch to support VoIP telephony equipment, a primary feature to consider is Power over Ethernet (PoE). PoE allows the switch to provide power to the VoIP phones through the Ethernet cables, eliminating the need for separate power cables and adapters. This simplifies installation and reduces clutter. Without PoE, the phones would require an additional power source, which can be inconvenient and may limit the placement options for the phones. Therefore, PoE is an important feature to ensure the smooth operation of the VoIP telephony system.
26.
QUESTION NO: 276
Which of the following protocols are used to transfer files between two systems?(Select TWO).
Correct Answer(s)
B. SCP
C. FTP
Explanation
The correct answer is SCP and FTP. SCP (Secure Copy Protocol) is a network protocol that allows secure file transfer between hosts. It uses SSH (Secure Shell) for authentication and encryption. FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a reliable and efficient way to transfer files and supports various operations such as uploading, downloading, and deleting files.
27.
QUESTION NO: 277
Which of the following network devices would a network administrator use to create a DMZ?
Correct Answer
C. Network-based firewall
Explanation
A network administrator would use a network-based firewall to create a DMZ. A DMZ (demilitarized zone) is a separate network that sits between the internal network and the external network (usually the internet). It is used to host public-facing services, such as web servers, while keeping them isolated from the internal network for security purposes. A network-based firewall is specifically designed to filter and control network traffic, making it an ideal choice for creating and securing a DMZ.
28.
QUESTION NO: 278
Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).
Correct Answer(s)
A. Snips
B. Cable crimper
Explanation
To create a CAT5e crossover cable, you would need snips and a cable crimper. Snips are necessary to cut the CAT5e cable to the desired length, while a cable crimper is required to attach the RJ-45 connectors to the cable ends. TDR (Time Domain Reflectometer), multimeter, and OTDR (Optical Time Domain Reflectometer) are not needed for creating a crossover cable.
29.
QUESTION NO: 279
A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?
Correct Answer
B. Identify the symptoms and potential causes
Explanation
The technician should first identify the symptoms and potential causes of the issue. This step is important in order to understand the root cause of the problem and determine the appropriate solution. By identifying the symptoms, the technician can gather information about the specific issues the user is facing. Then, by exploring potential causes, the technician can narrow down the possible reasons for the problem and develop an effective troubleshooting plan.
30.
QUESTION NO: 280
A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?
Correct Answer
A. Port forwarding
Explanation
To resolve the customer's problem with playing online games, the technician should configure port forwarding. Port forwarding allows specific ports or protocols to be directed to a specific device on the network, in this case, the customer's gaming console or computer. By configuring port forwarding, the technician can ensure that the necessary ports for online gaming are open and properly directed to the customer's device, allowing them to play games without any issues.
31.
QUESTION NO: 281
Which of the following is an advantage of lOOBase-T over lOOBase-FX?
Correct Answer
A. Uses a more flexible cable
Explanation
The advantage of using a more flexible cable in lOOBase-T over lOOBase-FX is that it allows for easier installation and flexibility in network design. The more flexible cable used in lOOBase-T, such as twisted pair cables, can be easily routed and maneuvered around obstacles, making it more convenient for network setups in various environments. On the other hand, lOOBase-FX uses fiber optic cables which are less flexible and may require more careful planning and installation.
32.
QUESTION NO: 282
Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?
Correct Answer
D. CAT6
Explanation
CAT6 cables are the most widely used in a corporate gigabit network scheme because they offer higher bandwidth and faster data transmission speeds compared to CAT5, CAT1, and CAT3 cables. CAT6 cables are designed to support gigabit Ethernet and can handle higher frequencies, resulting in better performance and less signal loss. They are also backward compatible with previous cable types, making them a popular choice for upgrading existing network infrastructure.
33.
QUESTION NO: 283
Which of the following LAN types would utilize CAT5 UTP?
Correct Answer
A. 100Base-TX
Explanation
CAT5 UTP (Unshielded Twisted Pair) is a type of Ethernet cable that is commonly used for LAN (Local Area Network) connections. It is capable of supporting data transfer speeds of up to 100 Mbps (megabits per second). Among the given LAN types, 100Base-TX is the only one that would utilize CAT5 UTP. 100Base-TX is a standard for Fast Ethernet, which uses two pairs of twisted-pair wires for transmitting and receiving data. Therefore, the correct answer is 100Base-TX.
34.
QUESTION NO: 284
A network administrator configured several network devices earlier today, but now the Internet is no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem?
Correct Answer
C. History logs
Explanation
The network administrator should reference the history logs to help identify the problem. History logs provide a record of past events and actions taken on the network devices. By reviewing the history logs, the administrator can determine if any recent changes or configurations may have caused the loss of internet connectivity for the users. This can help in troubleshooting and resolving the issue effectively.
35.
QUESTION NO: 285
Which of the following devices would be used to connect different broadcast domains in order to allow them to communicate with each other?
Correct Answer
D. Multilayer switch
Explanation
A multilayer switch would be used to connect different broadcast domains and allow them to communicate with each other. Unlike a bridge or a layer 2 switch, which operate at the data link layer and can only forward packets within the same broadcast domain, a multilayer switch operates at both the data link layer and the network layer. This means that it can not only forward packets within a broadcast domain but also route packets between different broadcast domains, enabling communication between them. A hub, on the other hand, simply broadcasts all incoming packets to all connected devices without any intelligence or segmentation.
36.
QUESTION NO: 286
Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?
Correct Answer
A. Rogue access points
Explanation
Enabling MAC address filtering on a switch can be used to mitigate the security threat of rogue access points. MAC address filtering allows the switch to only allow specific devices with approved MAC addresses to connect to the network. By implementing this security measure, unauthorized devices, such as rogue access points, will be prevented from connecting to the network, reducing the risk of unauthorized access and potential security breaches.
37.
QUESTION NO: 287
Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?
Correct Answer
A. CSMA/CD
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the correct answer. This mechanism is used in Ethernet networks to avoid collisions between data packets. When a collision occurs, CSMA/CD initiates a back-off time, during which the devices involved in the collision wait before attempting to retransmit their packets. This back-off time is calculated using a random algorithm to prevent repeated collisions. CSMA/CD is an important component of Ethernet networks, ensuring efficient and reliable data transmission.
38.
QUESTION NO: 288
Which of the following is an advantage of lOOBase-FX over IOOBase-TX?
Correct Answer
B. Longer cable runs
Explanation
lOOBase-FX has an advantage over lOOBase-TX in terms of longer cable runs. This means that lOOBase-FX can transmit data over a greater distance compared to lOOBase-TX.
39.
QUESTION NO: 289
At which of the following layers of the OSI model would a repeater operate?
Correct Answer
D. Layer 1
Explanation
A repeater operates at Layer 1 of the OSI model, which is the Physical layer. The Physical layer is responsible for transmitting raw bit streams over a physical medium, such as copper or fiber optic cables. A repeater receives a weak or degraded signal and regenerates it to boost the signal strength and extend the distance over which the signal can be transmitted. Therefore, a repeater operates at the lowest layer of the OSI model, which deals with the physical transmission of data.
40.
QUESTION NO: 290
Which of the following documentations would a network technician find ports that a company has blocked?
Correct Answer
A. Policies, procedures and configurations
Explanation
A network technician would find the ports that a company has blocked in the policies, procedures, and configurations documentation. This documentation provides information on the rules and restrictions set by the company regarding network access and security. It includes details on which ports are blocked or restricted to ensure the network's integrity and protect against potential threats.
41.
QUESTION NO: 291
A technician is troubleshooting a printer problem in a SOHO enviromnent. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?
Correct Answer
D. Place the printer on a static IP address.
Explanation
Placing the printer on a static IP address would prevent the problem of the computers being unable to print. By assigning a static IP address to the printer, it ensures that the IP address does not change, allowing the computers to consistently connect to the printer. This is especially important in a SOHO environment where there may not be a dedicated network administrator to manage IP address assignments.
42.
QUESTION NO: 292
Which of the following systems detects and reports attempts of unauthorized access to the network?
Correct Answer
C. IDS
Explanation
An Intrusion Detection System (IDS) is a system that detects and reports attempts of unauthorized access to a network. It monitors network traffic and analyzes it for any suspicious or malicious activity. Unlike a firewall, which primarily focuses on blocking or allowing network traffic based on predefined rules, an IDS is designed to detect and alert administrators about potential security breaches. An IDS can help identify and respond to unauthorized access attempts, providing an additional layer of security to the network.
43.
QUESTION NO: 293
.Which of the following software types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?
Correct Answer
B. IPS
Explanation
An Intrusion Prevention System (IPS) would be the best software type for identifying and reacting to an attack by shutting down a port or dropping certain types of packets. IPS is designed to monitor network traffic, detect potential threats or attacks, and take proactive measures to prevent them. It can analyze network packets in real-time, identify malicious activity, and respond by blocking or dropping the suspicious packets or closing the affected ports. This helps to protect the network and prevent further damage or unauthorized access.
44.
QUESTION NO: 294
A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?
Correct Answer
C. The user is connecting to the wrong SSID.
Explanation
The correct answer is "The user is connecting to the wrong SSID." This is the cause of the problem because if the user is connecting to the wrong SSID, they will be accessing a different wireless network than intended. This can result in slower network speeds and accessing shared folders that are unknown to the user, as they are connecting to a different network with different settings and permissions.
45.
QUESTION NO: 295
Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?
Correct Answer
C. T3
Explanation
T3 is the correct answer because it provides a 45Mbps circuit over TDM (Time Division Multiplexing) equipment. T3 is a high-speed digital transmission line that uses DS3 (Digital Signal 3) technology to achieve this speed. SONET, E3, and OC-12 are not capable of providing a 45Mbps circuit over TDM equipment.
46.
QUESTION NO: 296
A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?
Correct Answer
A. Implement an action plan
Explanation
The technician should first implement an action plan. This is the first step because it allows the technician to assess the situation, prioritize tasks, and create a plan of action to address the virus infection. By implementing an action plan, the technician can ensure that the necessary steps are taken in a systematic and organized manner to effectively mitigate the impact of the virus on the workstations.
47.
QUESTION NO: 297
The network amninistrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?
Correct Answer
B. Dynamic
Explanation
Dynamic IP addressing should be used by the network administrator because it does not require manual updating. With dynamic addressing, IP addresses are automatically assigned to devices on the network by a DHCP (Dynamic Host Configuration Protocol) server. This allows for easier management and scalability as devices can be added or removed from the network without the need for manual configuration.
48.
QUESTION NO: 298
Which of the following logical topologies uses centralized authentication?
Correct Answer
B. Client/server
Explanation
The client/server logical topology uses centralized authentication. In a client/server network, there is a central server that manages and controls access to resources. The server authenticates users and grants them access based on their credentials. This centralized authentication ensures that only authorized users can access the network resources, providing a higher level of security and control. In contrast, peer-to-peer, VPN, and VLAN topologies do not necessarily have centralized authentication mechanisms.
49.
QUESTION NO: 299
Which of the following command and switch combination would provide the following output?
Interface: 172.30.0.102 ---
Ox2 Internet Address Physical Address
Type 172.30.0.5
00-30-48-82-72-8c dynamic
Correct Answer
C. Arp-a
Explanation
The command "arp-a" is used to display the ARP (Address Resolution Protocol) cache table on a Windows system. It provides the output of the interface with the IP address 172.30.0.102 and its corresponding physical address (MAC address) 00-30-48-82-72-8c. This command is used to view the mapping between IP addresses and MAC addresses in the local network.
50.
QUESTION NO: 300
A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?
Correct Answer
A. Fault tolerance
Explanation
A second network card in a server that activates if the primary card fails is an example of fault tolerance. Fault tolerance refers to the ability of a system to continue functioning even in the presence of hardware or software failures. In this case, having a second network card ensures that the server can maintain network connectivity even if the primary card fails, thus providing fault tolerance.