A device isn’t connecting to a Wi-Fi network, and you discover the SSID is hidden. What configuration setting should you manually enter?
What is the SSID
A user complains that email messages aren’t sending but they can receive emails. Which protocol should be checked for outgoing messages?
What is SMTP
This IP class is used for very large networks, supporting over 16 million hosts and using a default subnet mask of 255.0.0.0.
What is Class A
An organization's data center is destroyed in a flood. The company transitions its operations to a backup site with full redundancy within hours. Which type of disaster recovery site is being utilized?
What is a Hot Site
A user reports that their computer is unable to access the internet, but they can successfully ping their router. Which OSI layer might the problem reside in?
What is the Network Layer
A company wants to ensure only authorized devices can access its Wi-Fi network. Which security protocol should they use?
What is WPA3
A device on the network sends data without establishing a connection first. Which protocol is likely being used?
What is UDP
IP addresses in this class range from 128.0.0.0 to 191.255.255.255 and are commonly used for medium-sized networks.
What is Class B
A company stores its critical data offsite but does not maintain hardware or networking capabilities at the remote location. Which type of disaster recovery site does this describe?
An employee is complaining about distorted audio during a VoIP call. Which OSI layer would you investigate to address jitter or latency issues?
What is the Transport Layer
A wireless network’s performance is suffering due to high congestion in the 2.4 GHz band. What solution could you deploy?
What is switching to the 5 GHz band
Which protocol translates private IP addresses into public IPs to enable Internet access?
What is NAT
This class supports small networks, has a default subnet mask of 255.255.255.0, and includes IP addresses from 192.0.0.0 to 223.255.255.255
What is Class C
After a cyberattack cripples a company's main office, the IT team shifts operations to a site that has necessary hardware pre-installed but requires software and data restoration. Which type of disaster recovery site is this?
What is a Warm Site
A customer is unable to view an encrypted file properly. The file appears as a string of unreadable characters. Troubleshooting should begin at which OSI layer?
What is the Presentation Layer
The wireless network becomes slow and unreliable during peak hours. What feature can help prioritize critical applications?
What is QoS
The command ping fails to work on a specific host. Which protocol might be blocked on the network?
The process of dividing a network into smaller sub-networks, often to improve organization and security, is called this.
What is Subnetting
After a hurricane damages the company's primary data center, the disaster recovery plan outlines steps to restore critical business operations within 24 hours. What is this recovery timeframe known as?
What is Recovery Time Objective (RTO)
Two devices on the same local network cannot communicate with each other. You notice that the devices cannot resolve each other's MAC addresses. Troubleshooting would occur at which OSI layer?
What is the Data Link Layer
To deliver Power over Ethernet (PoE) to network devices, the company relies on this standard.
What is 802.3af
Remote access to a network device using port 22 has stopped working. Which protocol would you troubleshoot?
What is SSH
A company requires a subnet with 200 usable IPs for its expanding department. What CIDR prefix would you use
What is /24
After a system failure, the company discovers that the last backup occurred 6 hours before the incident. The disaster recovery plan states that no more than 4 hours of data loss is acceptable. What metric is used to measure this acceptable data loss?
What is the Recovery Point Objective (RPO)
A user is trying to access their email through a web browser, but the page keeps timing out. Other network services, like streaming and file downloads, are working fine. Which OSI layer would you investigate first?
What is the Application Layer