100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
DATA Quizzes 1-12 Questions with 100% Correct Answers Graded A+ | Verified | Latest Update 2024, Actual Complete Solutions ,Garanteed Distinction $7.99
Add to cart

Exam (elaborations)

DATA Quizzes 1-12 Questions with 100% Correct Answers Graded A+ | Verified | Latest Update 2024, Actual Complete Solutions ,Garanteed Distinction

 7 views  0 purchase
  • Course
  • CompTIA
  • Institution
  • CompTIA

DATA Quizzes 1-12 Questions with 100% Correct Answers Graded A+ | Verified | Latest Update 2024, Actual Complete Solutions ,Garanteed Distinction

Preview 3 out of 16  pages

  • August 2, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CompTIA
  • CompTIA
avatar-seller
AnswersCOM
100%
DATA
Quizzes
1-12
802.11ac
Wave
2
devices
can
theoretically
support
how
much
maximum
throughput?
-
✔✔
3.47
Gbps
A
change
coordinator
functions
as
what
type
of
manager?
-
✔✔
project
manager
A
dedicated
telephone
switch
or
virtual
switching
device
that
connects
and
manages
calls
within
a
private
organization,
and
manages
call
connections
that
exit
the
network
through
a
VoIP
gateway,
is
known
by
what
term?
-
✔✔
VoIP
PBX
(private
branch
exchange)
A
differential
backup
covers
what
data
on
a
system?
-
✔✔
It
includes
data
that
has
changed
since
the
last
full
backup.
A
fractional
T1's
bandwidth
can
be
leased
multiples
of
what
data
rate?
-
✔✔
64
Kbps
A
highly
available
server
is
available
what
percentage
of
the
time?
-
✔✔
99.999%
A
junior
administrator
is
having
issues
connecting
to
a
router's
console
port
using
a
TIA/EIA
568B
standard
cable
and
a
USB
serial
to
RJ-45
adapter,
despite
verifying
terminal
settings.
What
is
the
issue?
-
✔✔
The
cable
must
be
a
rollover
cable.
A
network
with
10
bits
remaining
for
the
host
portion
will
have
how
many
usable
host
addresses?
-
✔✔
1022
A
network
with
a
CIDR
notation
of
/26
would
have
what
subnet
mask?
-
✔✔
255.255.255.192
A
person
posing
as
an
employee
strikes
up
a
conversation
with
a
legitimate
employee
as
they
walk
into
a
secured
area,
in
an
attempt
to
gain
access.
What
kind
of
social
engineering
is
this?
-
✔✔
tailgating
A
policy
in
which
all
exit
doors
for
a
building
stay
unlocked
during
a
fire
is
an
example
of
what
type
of
policy?
-
✔✔
fail-open
A
snapshot
is
most
similar
to
which
type
of
backup
scheme?
-
✔✔
incremental
backup
A
typical
fiber
termination
kit
should
include
what
tool
for
cutting
a
clean
slice
through
fiber
strands?
-
✔✔
fiber
cleaver
A
variant
of
BYOD,
what
does
CYOD
allow
employees
or
students
to
do?
-
✔✔
They
can
choose
a
device
from
a
limited
number
of
options.
A
vSwitch
(virtual
switch)
or
bridge
is
a
logically
defined
device
that
operates
at
what
layer
of
the
OSI
model?
-
✔✔
Layer
2 100%
A
Windows
computer
on
your
network
is
having
issues
resolving
queries
for
a
specific
domain,
but
not
other
domains.
Other
computers
on
the
same
network
resolve
the
name
just
fine.
What
command
can
you
issue
that
might
fix
the
problem?
-
✔✔
ipconfig
/flushdns
A
wireless
node
that
is
in
active
scanning
mode
transmits
what
special
type
of
frame
in
order
to
find
available
access
points?
-
✔✔
probe
frame
Amazon
and
Rackspace
both
utilize
what
virtualization
software
below
to
create
their
cloud
environments?
-
✔✔
Citrix
Xen
An
attack
that
relies
on
redirected
and
captured
secure
transmissions
as
they
occur
is
known
as
what
type
of
attack?
-
✔✔
man-in-the-middle
attack
An
interface
that
manages
traffic
from
multiple
VLANs
is
known
by
what
term?
-
✔✔
trunk
port
An
IP
address
of
192.168.18.73/28
has
what
network
ID?
-
✔✔
192.168.18.64
An
open
electrical
circuit
as
a
result
of
a
failed
circuit
breaker
is
considered
to
be
what
type
of
failure
system?
-
✔✔
fail-close
An
RFID
label
on
a
box
is
an
example
of
what
type
of
physical
security
detection
method?
-
✔✔
asset
tracking
tagging
At
the
Transport
layer
of
the
OSI,
what
is
used
to
find
and
communicate
with
a
particular
application
running
on
a
host?
-
✔✔
port
numbers
At
what
layer
of
the
OSI
model
do
the
IP,
ICMP,
and
ARP
protocols
operate?
-
✔✔
Network
At
what
layer
of
the
OSI
model
does
a
network
switch
normally
operate?
-
✔✔
Layer
2
At
what
point
is
a
packet
considered
to
be
a
giant?
-
✔✔
It
becomes
a
giant
when
it
exceeds
the
medium's
maximum
packet
size.
Both
10GBase-ER
and
10GBase-EW
have
what
maximum
distance
limitation
on
a
segment
of
single
mode
fiber?
-
✔✔
40km
Broadband
cable
Internet
service
and
cable
TV
are
most
commonly
delivered
over
long
distances
via
what
type
of
cable?
-
✔✔
RG-6
By
default,
what
is
the
MTU
size
on
a
typical
Ethernet
network?
-
✔✔
1500
bytes
By
default,
what
network
connection
type
is
selected
when
creating
a
VM
in
VMware,
VirtualBox,
or
KVM?
-
✔✔
NAT
mode 100%
By
far
the
most
popular
AAA
service,
what
open-source
service
runs
in
the
Application
layer
and
can
use
UDP
or
TCP
in
the
Transport
layer?
-
✔✔
RADIUS
Considering
that
multiple
users
occupy
the
same
channel
when
using
CDMA,
how
are
various
calls
using
this
technology
kept
separate?
-
✔✔
The
packets
are
coded
such
that
individual
calls
can
be
distinguished.
Diffraction
has
what
affect
on
a
wireless
signal's
propagation?
-
✔✔
The
signal
is
split
into
secondary
waves
that
continue
in
the
direction
in
which
they
split.
During
termination
of
twisted
pair
cabling,
what
should
be
done
to
ensure
minimal
cross
talk
is
introduced?
-
✔✔
No
more
than
1
inch
of
the
cable
should
be
exposed.
Encrypted
control
of
remote
computers
using
the
RDP
protocol
is
accomplished
using
what
port
number?
-
✔✔
TCP
3389
Enforcing
a
virtual
security
perimeter
using
a
client's
geographic
location
is
known
by
what
term?
-
✔✔
geofencing
Equipment
data
racks
most
commonly
are
a
standard
width
of
what
measurement?
-
✔✔
19
inches
Given
a
host
IP
address
of
172.16.1.154
and
a
subnet
mask
of
255.255.254.0,
what
is
the
network
ID
for
this
host?
-
✔✔
172.16.0.0
Healing
messages
are
a
feature
of
what
smart
home
protocol?
-
✔✔
Z-Wave
How
can
you
determine
the
manufacturer
of
a
NIC
card
based
on
the
MAC
address?
-
✔✔
The
first
24
bits,
known
as
the
Organizationally
Unique
Identifier,
identify
the
manufacturer.
How
do
routers
create
a
broadcast
domain
boundary?
-
✔✔
They
do
not
forward
broadcast
traffic.
How
does
a
line
conditioning
UPS
protect
network
equipment?
-
✔✔
It
filters
line
noise
from
incoming
power.
How
does
the
802.11
data
frame
indicate
how
a
large
packet
should
be
fragmented?
-
✔✔
The
sequence
control
field
indicates
how
packets
will
be
subdivided.
How
large
is
the
802.1Q
tag
that
is
added
to
an
Ethernet
frame
when
using
VLANs?
-
✔✔
4
bytes
How
many
data
streams
are
used
in
802.11ac
Wave
2
devices?
-
✔✔
4
data
streams
How
many
subnets
can
a
/48
site
prefix
support?
-
✔✔
65,536
subnets
How
often
should
you
require
users
to
change
their
passwords?
-
✔✔
every
60
days

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AnswersCOM. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50064 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
Add to cart
Added