IT Questions Bank A key network switch has failed because of excessive humidity. What type of physical threat caused the problem?ITExamAnswers asked 2 years ago • CCNA 1 v6What factors should be taken into account when using a protocol analyzer to determine traffic flow on a network? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 1 v6Fill in the blank. ____ allows users of analog phones to take advantage of the IP network.ITExamAnswers asked 2 years ago • CCNA 1 v6Which network protocol should a network administrator use to remotely configure a network device?ITExamAnswers asked 2 years ago • CCNA 1 v6What is true of an application layer service?ITExamAnswers asked 2 years ago • CCNA 1 v6Which planning and design factors would be considered as part of manageability focus when implementing a small network? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 1 v6Which type of traffic should be given the highest priority on a network?ITExamAnswers asked 2 years ago • CCNA 1 v6What would be considered an example of redundancy in network design? (Choose three.)ITExamAnswers asked 2 years ago • CCNA 1 v6Why should the IP addressing scheme be carefully planned and documented? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 1 v6What is the purpose of DNS?ITExamAnswers asked 2 years ago • CCNA 1 v6What TCP/IP layer supports the exchange of data between programs running on the source and destination hosts?ITExamAnswers asked 2 years ago • CCNA 1 v6DHCP enables clients on a network to do which of the following?ITExamAnswers asked 2 years ago • CCNA 1 v6What main protocols do email users and servers normally use to process email? (Choose three.)ITExamAnswers asked 2 years ago • CCNA 1 v6The TCP/IP application layer effectively consists of which three OSI layers?ITExamAnswers asked 2 years ago • CCNA 1 v6Which network type consists of a number of LANs that are connected together across a limited geographic area?ITExamAnswers asked 2 years ago • Network Security 1.0