Network Media and Topologies
SKILLSET
No description available
Related Questions
- A ___ Topology is the most likely topology to provide full redundancy of connections.
- Name two types of fiber connection.
- What protocol will allow you to send email?
- Which of the following topologies requires a multi-point connection ?
- In the Mesh Topology, what is its BIGGEST advantage and disadvantage? (Choose one advantage, and one disadvantage)
- A network technician wants to allow access between VLANs on five switches. Which of the following can be used to perform this? Select all that apply.
- Which of the following technology uses 802.3af IEEE compliance and is used for powering up WiFi access points without connecting directly to a power supply, but instead uses a switchport?
- This topology is the least fault tolerant.
- What is the speed of a standard T1 connection?
- One of your servers is suffering from intermittent poor performance. As the CPU, RAM, and disk utilization are normal, you suspect it is the target of a network-based hacking attack. You would like to place a sniffer with a protocol analyzer next to the server's network interface to monitor traffic. The server is connected to an Ethernet switch, but the switch does not have port mirroring capability. You also do not want to add to the server's load by running the sniffer on the server itself. What logical network topology do you need to place a sniffer next to the server, and how would you implement it?