单项选择题
A. Create a new VLAN for the out-of-range users.
B. Add a wireless access point for the out-of-range users.
C. Upgrade the out-of-range users’ SSID searching software.
D. Enable network sharing on the users’ computers that are within range.
多项选择题 Which of the following are encrypted protocols? ()(Select TWO).
单项选择题 A technician needs to ping a client’s machine that the technician is working on, to ensure that thenetwork card is functioning correctly. Which of the following IP addresses should be used?()
单项选择题 A technician suspects the AC voltage into a PC power supply is bad. Which of the following toolswould MOST likely be used to confirm the diagnosis?()