Which statement describes the use of the ping command?

Which statement describes the use of the ping command? The ping command tests end-to-end connectivity between two devices. The ping command can be used to determine the exact location of the problem when troubleshooting reachability issues. The ping command can be used to test reachability using the physical address of the device. The ping command […]
Continue reading…

 

Which type of network cable is used to connect the components that make up satellite communication systems?

Which type of network cable is used to connect the components that make up satellite communication systems? coaxial fiber-optic shielded twisted-pair unshielded twisted-pair Answers Explanation & Hints: Coaxial cable is commonly used to connect the various components that make up satellite communication systems and cable TV.
Continue reading…

 

What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)

What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.) Fiber-optic cable is immune from EMI and RFI. Fiber-optic cables can extend several miles. Fiber-optic cables use extra shielding to protect copper wires. Fiber-optic cables are easy to install.. Fiber-optic cables are commonly found in both homes and small businesses. Answers Explanation […]
Continue reading…

 

What are two sources of electromagnetic interference that can affect data transmissions? (Choose two.)

What are two sources of electromagnetic interference that can affect data transmissions? (Choose two.) LED monitor microwave oven infrared remote control cordless phone florescent light fixture Answers Explanation & Hints: Electromagnetic interference or EMI is commonly caused by equipment such as microwave ovens and fluorescent light fixtures.
Continue reading…

 

Which criterion can be used to select the appropriate type of network media for a network?

Which criterion can be used to select the appropriate type of network media for a network? the types of data that need to be prioritized the cost of the end devices that are used in the network the number of intermediary devices that are installed in the network the environment where the selected medium is […]
Continue reading…

 

Refer to the exhibit. A home wireless network is being configured within Packet Tracer. The user adds a wireless router, a PC, and three laptops. The user is reviewing the wireless connection on one of the laptops. What can be determined?

Refer to the exhibit. A home wireless network is being configured within Packet Tracer. The user adds a wireless router, a PC, and three laptops. The user is reviewing the wireless connection on one of the laptops. What can be determined? Because the password is not enabled, the laptop cannot connect to the wireless router. […]
Continue reading…

 

Refer to the exhibit. Which menu item would be used to bring up a command prompt environment to be able to ping another network device?

Refer to the exhibit. Which menu item would be used to bring up a command prompt environment to be able to ping another network device? Physical Config Desktop Programming Attributes Answers Explanation & Hints: The Desktop menu item is used to access common applications and windows used to configure a device such as the IP […]
Continue reading…

 

Refer to the exhibit. A student is creating a wired and wireless network in Packet Tracer. After inserting a router, switch, and PC, the student chooses a straight-through cable to connect the PC to the switch. Which connection would be the best port for the student to choose on the PC?

Refer to the exhibit. A student is creating a wired and wireless network in Packet Tracer. After inserting a router, switch, and PC, the student chooses a straight-through cable to connect the PC to the switch. Which connection would be the best port for the student to choose on the PC? RS 232 USB0 USB1 […]
Continue reading…

 

When authenticating within Packet Tracer, which two items could you use? (Choose two.)

When authenticating within Packet Tracer, which two items could you use? (Choose two.) a previously configured PIN a previously configured pattern a username associated with NetAcad a username associated with a specific school an email address found in the NetAcad profile Answers Explanation & Hints: When Packet Tracer first opens, an authentication screen appears. Use […]
Continue reading…