Network Plus NC Book Questions

684 terms by adefiant1

Create a new folder

Advertisement Upgrade to remove ads

What is the valid range of values that may appear in an IPv4 octet? Give your answer in decimal as well as binary.

The range of values that an IPv4 octet can take on is 0 through 255 in decimal, which stems from the values 00000000 through 11111111 in binary.

Name some of the benefits of IPv6 over IPv4.

more available addresses, simpler header, options for authentication and other security

What is the term for the auto-configuration technology responsible for addresses that start with 169.254?

Automatic Private IP Addressing (APIPA) is the technology that results in hosts automatically configuring themselves with addresses that begin with 169.254.

What does the IP Properties selection Obtain an IP Address Automatically indicate?

Filling in the Obtain an IP Address Automatically radio button in IP Properties configures the host as a DHCP client

What effect will an inappropriate DHCP server have on hosts using static IP addresses?

None;

DHCP servers cannot override statically assigned IP information.

What is the name for a 48-bit (6-byte) numerical address physically assigned to a network interface, such as a NIC?

A MAC address, sometimes called a hardware address or even a burned-in address

What gives IPv6 the ability to reference more addresses than IPv4?

The fact that it has 128-bit (16-octet) addresses, compared to IPv4's 32-bit (4-octet) addresses

What predecessor to DHCP, on which DHCP is based, was used to assign a workstation its IP information and to supply it with a boot image?

BootP, the Bootstrap Protocol, used the same port numbers as DHCP but supplied more simplified information to a diskless workstation and allowed the workstation to download a remote boot image.

What is the Class C range of values for the first octet in decimal and in binary?

192-223, 110xxxxx.

What is the 127.0.0.1 address used for?

Loopback or diagnostics

Which of the following addresses is not allowed on the Internet?

191.192.168.1

191.168.169.254

172.32.255.0

172.31.12.251

172.31.12.251

A host automatically configured with an address from which of the following ranges indicates an inability to contact a DHCP server?

169.254.0.X with a mask of 255.255.255.0

169.254.X.X with a mask of 255.255.0.0

169.254.X.X with a mask of 255.255.255.0

169.255.X.X with a mask of 255.255.0.0

169.254.X.X with a mask of 255.255.0.0

Which statement regarding private IP addresses is most accurate?

Private addresses cannot be used in intranets that require routing.

Private addresses must be assigned by a registrar or ISP.

A remote host across the Internet cannot ping your host if it has a private address

Private addresses can only be used by a single administrative domain.

A remote host across the Internet cannot ping your host if it has a private address

Which of the following is a valid Class A address?

191.10.0.1 255.0.0.0

127.10.0.1 255.0.0.0

128.10.0.1 255.0.0.0

126.10.0.1 255.0.0.0

126.10.0.1 255.0.0.0

Which of the following is a valid Class B address?

10.1.1.1 255.255.0.0

126.1.1.1 255.255.0.0

129.1.1.1 255.255.0.0

192.168.1.1 255.255.0.0

129.1.1.1 255.255.0.0

Which of the following describes a broadcast address?

All network bits are on (1s).

All host bits are on (1s).

All network bits are off (0s).

All host bits are off (0s).

All host bits are on (1s).

Which of the following is a Layer 2 broadcast?

FF:FF:FF:EE:EE:EE

FF:FF:FF:FF:FF:FF

255.255.255.255

255.0.0.0

FF:FF:FF:FF:FF:FF

In a class C IP address, how long is the network address?

8 bits

16 bits

24 bits

32 bits

24 bits

Which of the following is true when describing a unicast address?

Packets addressed to a unicast address are delivered to a single interface.

These are your typical publicly routable addresses, just like regular publicly routable addresses in IPv4.

These are like private addresses in IPv4 in that they are not meant to be routed.

These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.

Packets addressed to a unicast address are delivered to a single interface.

A host is rebooted and you view the IP address that it was assigned. The address is 169.123.13.34. Which of the following happened?

The host received an APIPA address

The host received a multicast address

The host received a public address

The host received a private address

The host received a public address

An IPv4 addresses uses 32 bits. How many bits is an IPv6 address?

64

128

192

255

128

Which of the following is true when describing a multicast address?

Packets addressed to a unicast address from a multicast address are delivered to a single interface.

Packets are delivered to all interfaces identified by the address. This is also called a one‐to‐many address.

It identifies multiple interfaces and is delivered to only one address. This address can also be called one‐to‐one‐of‐many.

These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.

Packets are delivered to all interfaces identified by the address. This is also called a one‐to‐many address.

Which of the following is true when describing an anycast address?

Packets addressed to a unicast address from an anycast address are delivered to a single interface.

Packets are delivered to all interfaces identified by the address. This is also called a one‐to‐many address.

This address identifies multiple interfaces, and the anycast packet is delivered to only one address. This address can also be called one‐to‐one‐of‐many.

These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.

This address identifies multiple interfaces, and the anycast packet is delivered to only one address. This address can also be called one‐to‐one‐of‐many.

You want to ping the loopback address of your local host. Which two addresses could you type?

ping 127.0.0.1

ping 0.0.0.0

ping ::1

trace 0.0.::1

ping 127.0.0.1
ping ::1

What two statements about IPv6 addresses are true?

Leading zeros are required.

Two colons (::) are used to represent successive hexadecimal fields of zeros.

Two colons (::) are used to separate fields.

A single interface will have multiple IPv6 addresses of different types.

Two colons (::) are used to represent successive hexadecimal fields of zeros.

What two statements about IPv4 and IPv6 addresses are true?

An IPv6 address is 32 bits long, represented in hexadecimal.

An IPv6 address is 128 bits long, represented in decimal.

An IPv4 address is 32 bits long, represented in decimal.

An IPv6 address is 128 bits long, represented in hexadecimal.

An IPv4 address is 32 bits long, represented in decimal.
An IPv6 address is 128 bits long, represented in hexadecimal.

Which of the following is a Class C network address?

10.10.10.0 255.255.255.0

127.0.0.1 255.255.255.0

128.0.0.0 255.255.0.0

192.255.254.0 255.255.255.0

192.255.254.0 255.255.255.0

Which two of the following are private IP addresses? (Choose two.)

12.0.0.1

168.172.19.39

172.20.14.36

172.33.194.30

192.168.24.43

172.20.14.36
192.168.24.43

Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)?

10.10.1.1

168.16.1.1

234.1.1.1

172.30.1.1

168.16.1.1

Which of the following is an invalid IP address for a host?

10.0.0.1

128.0.0.1

224.0.0.1

172.0.0.1

224.0.0.1

The difference between a physical network diagram and a logical network diagram

A physical diagram shows all of the physical connections and devices, and in many cases the cables or connections between the devices.

A logical network diagram takes a higher-level view, such as your subnets and which protocols those subnets use to communicate with each other.

The difference between policies, procedures, and regulations

A policy is created to give users guidance as to what is acceptable behavior on the network.

Procedures are steps to be taken when an event occurs on the network.

Regulations are imposed on your organization; you are required to follow them, and if you don't, you may be subject to punitive actions.

How your servers and network devices help you monitor your network

Most servers and network devices have monitoring tools built in that are capable of tracking data and events on your network. These include graphical tools as well as log files.

There are several ways to manage traffic on your network to speed up access and in some cases guarantee available bandwidth to applications. These include?

QoS
traffic shaping
load balancing
high availability
using caching servers

Two examples of high-bandwidth applications

Voice over IP (VoIP) and real-time video streaming

In which type of network diagram do you typically list the IP addresses of your servers and router ports?

Logical

Which network-performance optimization technique uses a contract to determine which data can get on to the network?

Traffic Shapping

The lowest level of QoS is called ___________________.

Best effort

The variation in packet delay on a network is called___________________.

Jitter

Spreading network traffic across multiple connections is called___________________.

Load balancing

A standard of normal network performance is called___________________.

Baseline

If you need to connect two PCs directly together using their network adapters, what type of cable do you need?

Crossover

Which network-performance optimization technique uses bandwidth throttling?

Traffic Shapping

What are requirements imposed on the way you manage your network called?

Regulations

The steps you should take when, for example, a network user is fired, are called___________________.

Procedures

UTP cables use which type of connector?

RJ-11

RJ-25

RJ-45

BCN

RJ-45

Which type of cable will have the pins in the same order on both connectors?

Crossover cable

Patch cable

Console cable

Telephone cable

Patch cable

Which pins are switched in a crossover cable?

1 and 2, and 3 and 4

1 and 3, and 2 and 6

2 and 4, and 5 and 7

1 and 4, and 5 and 8

1 and 3, and 2 and 6

UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?

White/Orange, Orange, Blue, White/Green, White/Blue, Green, White/Brown, Brown

Orange, White/Orange, White/Green, Blue, White/Blue, White/Brown, Brown, Green

White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown

White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

o-O-g-B-b-G-r-R

When measuring the performance of a network components or system, which of the following are key components to baseline? (Choose all that apply.)

Hard disk

Memory

Processor

Network adapter

All of the above

All of the above

Which of the following govern how the network is configured and operated as well as how people are expected to behave on the network?

Baselines

Laws

Policies

Procedures

Policies

You have upgraded the firmware on your switches and access points. What documentation do you need to update?

Baselines and configuration documentation

Physical network diagram

Logical network diagram

Wiring schematics

Baselines and configuration documentation

A user reports slowness on a network. The network administrator can begin to monitor the system by using what to look into the problem?

Baseline

Load balancing

Packet sniffing

Regulations

Packet sniffing

Load testing, connectivity testing, and throughput testing are all examples of what?

Load balancing

Network monitoring

Packet sniffer

Traffic shaping

Network monitoring

Which type of server log will give information about specific programs?

Application

Security

System

None of the above

Application

Which type of server log will give you information about drivers and services?

Application

Security

System

None of the above

System

What can provide different priority levels to different applications, data flows, or users to help guarantee performance levels?

1Gbps connection

Bandwidth

Uptime

Quality of service

Quality of service

Which of the following is not a level of QoS?

Best effort

Excellent load

Controlled load

Completed load

Completed load

You have added a new cable segment to your network. You need to make sure you document this for troubleshooting purposes. What should you update?

The disaster recovery plan

The wiring schematics

The router connections document

The baseline document

The wiring schematics

What is the basic purpose of QoS (choose 2)?

Block access to certain web sites

Make your entire network run faster

Provide priority of one of more type of traffic over others

Block access to web resources for just certain users or groups

Prioritize delay sensitive traffic

Provide priority of one of more type of traffic over others

Prioritize delay sensitive traffic

Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

Traffic shaping

Jitter

Logical

Load balancing

Traffic shaping

A network administrator needs to spread network traffic across multiple connections in which only one server is active and handling requests at a time. Which strategy could be used to help optimize traffic?

Load balancing

Traffic shaping

Obtaining a 1Gbps connection

Following the regulations

Load balancing

Which of the following are reasons to optimize network performance? (Choose all that apply.)

Maximizing uptime

Minimizing latency

Using VoIP

Using video applications

B and D

All of the above

All of the above

What term describes technologies that can deliver voice communications over the Internet?

Jitter

Uptime

Voice over Internet Protocol

None of the above

Voice over Internet Protocol

To optimize performance on your network, which of the following control traffic in some way? (Choose all that apply.)

QoS

Traffic shaping

Load balancing

Caching services

All of the above

All of the above

Know the nine troubleshooting steps, in order

Gather information

Identify the affected areas

Determine if anything has changed

Establish the most probable cause

Escalate if necessary

Create an action plan

Implement and test

Verify the results

Document the solution

What is Step 3 of the 9‐step troubleshooting model?

Determine if anything has changed in the network.

What is Step 9 of the 9‐step troubleshooting model?

Document the solution and the entire process.

How is crosstalk minimized in twisted‐pair cabling?

By twisting the wire pairs together, putting them at a 90 degree angle to each other

If you plug a host into a switch port and the user cannot get to the server or other services they need to access, what could the problem be?

The port has the wrong VLAN assignment.

If you don't have the Spanning Tree Protocol (STP) running on your switches, what problem could possibly occur?

Switching loops. If someone plugs two cables between switches, and STP is not running, a switching loop will occur.

When a signal moves through any medium, the medium itself will degrade the signal. What is this called?

Attenuation

What is Step 4 of the 9‐step troubleshooting model?

Establish the most probable cause.

What is Step 5 of the 9‐step troubleshooting model?

Determine if escalation is necessary

What are some of the problems that, if determined, should be escalated?

Switching loops
routing loops
routing problems
Proxy ARP
broadcast storms

What cable issues should you know and understand for network troubleshooting?

Crosstalk, attenuation, collisions, shorts, open impedance mismatch, interference

Which of the following are not steps in the Network+ troubleshooting model? (Choose all that apply.)

Reboot the servers.

Gather information.

Determine if anything has changed.

Determine if escalation is necessary.

Document the solution and the entire process.

Reboot all the routers.

Reboot the servers.
Reboot all the routers.

You have a user who cannot connect to the network. What is the first thing you could check to determine the source of the problem?

Workstation configuration

Connectivity

Patch cable

Server configuration

Connectivity

A user cannot access the local intranet. Which action will not help you determine how to narrow the problem down to the intranet?

Accessing the intranet from your workstation

Accessing the intranet from the user's workstation as yourself

Replacing the patch cable on the workstation

Asking another user to access the intranet from the problem user's workstation

Replacing the patch cable on the workstation

Several users can't log in to the server. Which action would help you to narrow the problem down to the workstations, network, or server?

Run tracert from a workstation.

Check the server console for user connections.

Run netstat on all workstations.

Check the network diagnostics.

Check the server console for user connections.

A user can't log in to the network. She can't even connect to the Internet over the LAN. Other users in the same area aren't experiencing any problems. You attempt to log in as this user from your workstation with her username and password and don't experience any problems. However, you cannot log in with either her username or yours from her workstation. What is a likely cause of the problem?

Insufficient rights to access the server

A bad patch cable

Server down

Wrong username and password

A bad patch cable

A user is experiencing problems logging in to a Unix server. He can connect to the Internet over the LAN. Other users in the same area aren't experiencing any problems. You attempt logging in as this user from your workstation with his username and password and don't experience any problems. However, you cannot log in with either his username or yours from his workstation. What is a likely cause of the problem?

The Caps Lock key is pressed.

The network hub is malfunctioning.

You have a downed server.

You have a jabbering NIC.

The Caps Lock key is pressed

You receive a call from a user who is having issues connecting to a new VPN. Which is the first step you should take?

Find out what has changed

Reboot the workstation

Document the solution

Identify the symptoms and potential causes

Identify the symptoms and potential causes

A workstation presents an error message to a user. The message states that a duplicate IP address has been detected on the network. After establishing what has changed in the network, what should be the next step using the standard troubleshooting model?

Test the result.

Select the most probable cause.

Create an action plan.

Identify the results and effects of the solution.

Select the most probable cause.

You have gathered information on a network issue and determined the affected areas of the network. What is your next step in resolving this issue?

You should implement what the best solution for the issue is

You should test the best solution for the issue

You should check to see if there have been any recent changes to this affected part of the network.

You should consider any negative impact to the network that might be caused by a solution

You should check to see if there have been any recent changes to this affected part of the network.

A user calls you, reporting a problem logging in to the corporate intranet. You can access the website without problems using the user's username and password. At your request, the user has tried logging in from other workstations but has been unsuccessful. What is the most likely cause of the problem?

The user is logging in incorrectly.

The network is down.

The intranet server is locked up.

The server is not routing packets correctly to that user's workstation.

The user is logging in incorrectly.

You have just implemented a solution and you want to celebrate your success. But what should you do next before you start your celebration?

Gather more information about the issue

Document the issue and the solution that was implemented

Test the solution and identify other effects it may have

Escalate the issue

Test the solution and identify other effects it may have

You can ping the local router and web server that a local user is trying to reach, but you cannot reach the web page that resides on that server. From Step 4 of the troubleshooting model, what is a possible problem that would lead to this situation?

Your network cable is unplugged.

There is a problem with your browser.

Your NIC has failed.

The web server is unplugged.

There is a problem with your browser

When troubleshooting an obscure network problem, what physical conditions should be reviewed to make sure the network device is operating correctly? (Choose all that apply.)

Excessive heat

Low/excessive humidity

ESD problems

All of the above

All of the above

Which of the following is not a basic physical issue that can occur on a network when a user is connected via cable?

Crosstalk

Shorts

Open impedance mismatch

DNS configurations

DNS configurations

You are troubleshooting a LAN switch and have identified the symptoms. What is the next step you should take?

Escalate the issue

Create an action plan

Implement the solution

Determine the scope of the problem

Escalate the issue

A user calls you, complaining that he can't access the corporate intranet web server. You try the same address, and you receive a Host Not Found error. Several minutes later, another user reports the same problem. You can still send email and transfer files to another server. What is the most likely cause of the problem?

The hub is unplugged.

The server is not routing protocols to your workstation.

The user's workstation is not connected to the network.

The web server is down.

The web server is down.

You have implemented and tested a solution and identified any other effects the solution may have, what is your next step?

Create an action plan

Close the case and head home for the day

Reboot the Windows server

Document the solution

Document the solution

Users are reporting that they can access the internet but not the internal company website. Which of the following is the most likely problem?

The DNS entry for the server is non‐authoritative

The intranet server is down

The DNS address handed out by DHCP is incorrect

The default gateway is incorrect

The DNS entry for the server is non‐authoritative

Several users have complained about the server's poor performance as of late. You know that the memory installed in the server is sufficient. What could you check to determine the source of the problem?

Server's NIC link light

Protocol analyzer

Performance‐monitoring tools

Server's System Log file

Performance‐monitoring tools

You lose power to your computer room and the switches in your network do not come back up when everything is brought online. After you have identified the affected areas, established the cause and escalated this problem, what do you do next?

Start to implement a solution to get those users back online asap

Create an action plan and solution

Meet with the emergency response team to determine the next step.

Copy all the working routers configurations to the non‐working switches

Meet with the emergency response team to determine the next step.

what is the basic purpose of a packet sniffer

To collect and analyze each individual packet that is captured on a specific network segment to determine if problems are happening.

the main purpose of IDS/IPS software

The IDS detects unwanted attempts to manipulate network systems and/or environment

The IPS is a computer security device that monitors network and/or system activities for malicious behavior.

what an OTDR is used for

An optical time-domain reflectometer iis an optoelectronic instrument used to test fiber-optic cabling. You can learn the cable's estimated length, attenuation (loss in db), and the location of faults.

True/False: An IDS box can find and fix a problem as the attack occurs

False

True/False: A TDR is used to test fiber connections

False

True/False: An IDS box will report an attack but not fix an attack

True

True/False: An OTDR is used to test fiber connections

True

True/False: A network analyzer will see every packet on every segment of your network at the same time

False

If you want to stop hackers before they get into your network, what type of network scanner will you use?

An Intrusion Prevention System (IPS)

True/False: It is okay to scan the DoD network servers with a port scanner.

False

You need to monitor the temperature of your server room. What device should you use?

A temperature monitor

You want to monitor your UPS systems and make sure they are functioning correctly. What device should you use?

A voltage event recorder

What type of device is used to put an RJ-45 end on a Cat 5e cable?

A cable stripper/crimper

Which is a tool of network scanners?

Packet sniffers

IDS/IPS software

Port scanners

All of the above

All of the above

What is the purpose of packet sniffers?

Discarding frames

Sending transmissions from one port to another port

Looking inside every packet on a network segment

Monitoring the network for malicious behavior

Looking inside every packet on a network segment

You need to trace cables in multiple pair wiring. What tool will you use?

Toner probe

IDS

cable tester

butt set

Toner probe

What tool would you use to both find a break in a fiber optic connection and test the fiber connectivity on the network?

Multimeter

OTDR

Butt set

Toner probe

OTDR

You need to create a cable that will connect your host to a wall jack connection. Which of the following will you use?

IDS/IPS

Snips

Cable strippers

Multimeter

Snips

Where is the IDS/IPS software typically placed within a network?

Between the internal router and firewall connected to the ISP

Between the printer and router connected to the ISP

Between the computer and switch configured with VLANs

Between the firewall and router connected to the email server

Between the internal router and firewall connected to the ISP

What is the purpose of a port scanner?

Scan UDP for closed ports

Sweep TCP for closed ports

Search the network host for open ports

None of the above

Search the network host for open ports

What is the purpose of wire-map testers?

Check copper cable for crossed pairs only

Analyzes protocols in software

Help find unused protocols and remove them from the network

Detect transposed wires, opens, and shorts in twisted-pair cables

Detect transposed wires, opens, and shorts in twisted-pair cables

Which of the following can check the speed and condition of the signal on a cable as well as measure the time it takes to send a signal down the wire and back?

Multimeter

TDR

Tone generator

event recorder

TDR

Which device should be used if you need to determine whether your network meets ISO or TIA standards?

Angry IP

Certifiers

Nmap

Routing table

Certifiers

Which software tool is used to view network traffic at the frame level?

TDR

Multimeter

Port scanner

Packet sniffer

Packet sniffer

Which function does a TDR not do?

Estimate cable lengths

Splice and connector locations and their associated loss amounts

Display unused services

Determine cable-impedance characteristics

Display unused services

Which device would be used to measure voltage?

Multimeter

OTDR

Butt set

Toner probe

Multimeter

Which device would most likely be used to locate a specific connection in an unlabeled punch-down block?

VOM

Certifier

TDR

Toner probe

Toner probe

Which tool would be used to connect wire between two punch-down block blades?

Punch-down tool

Crimper

Snips

Strippers

Punch-down tool

Which tool is used to attach an RJ-45 connector to a CAT5 cable?

Punch-down tool

Crimper

Snips

Strippers

Crimper

Which of the following would a technician use a punch down tool on?

RJ-45 connector

CSU/DSU

110 block

Fiber ST connector

100 block

Which device monitors incoming voltage levels and overvoltage thresholds?

Repeater

Toner probe

VOM

Surge protector

Surge protector

Which application would a voltage event record be used for?

Voltage recording

Distortion measurement

Flicker measurement

Capturing voltage transients

All of the above

All of the above

You install new switches in your server room and they are having network instability and other issues across all servers in the rack. Which device would be used to alert you of a system overheating?

Voltage event recorder

Temperature monitor

Surge protector

Probe

Temperature monitor

What command line utility echoes back if a machine is alive and active on a network

PING

What command line utility shows the path that the ping packets take from source to target

tracert
tracerout - linux

What command line utility enables a user to participate in a remote text-based session

telnet

what the tracert utility does

The tracert utility finds the route from your computer to any computer on a network.

what the ping utility does

ping determines whether a particular IP host is responding

what the ftp utility does

The ftp utility allows you to reliably download and upload files from and to an FTP server across the Internet

what the ipconfig and ifconfig utilities do

ipconfig displays TCP/IP configuration information for Windows NT and later operating systems.

The ifconfig utility performs a similar function in Unix environments, in addition to performing certain interface‐configuration tasks.

what the nslookup and dig utilities do

Nslookup and dig allow you to look up DNS resolution information

What command can you type from a command prompt to see the hops a packet takes to get to a destination host?

traceroute or tracert

Which command will tell you if a host is alive somewhere on the network?

PING

You need your IP address, subnet mask, default gateway, and DNS information. What command will you type in from a Windows command prompt?

ipconfig /all

You need to log in as a dumb terminal to a server or Unix host and run programs. What application will you use?

Telnet

You need to add a route to your Windows servers routing table. What command will you use?

route

You want to log in to a server and transfer files. What application will you use?

FTP

You need to check your name-resolution information on your host. What command will you type in from the command prompt?

nslookup

You want to use netstat, but you only want to see the IP address not the names of the hosts. Which modifier will you use?

‐n

You want the IP configuration on a Unix host. What command will you type in at the command prompt?

ifconfig

Which Windows command will show you the routing table of your host or server?

route print

Which TCP/IP utility is most often used to test whether an IP host is up and functional?

ftp

telnet

ping

netstat

ping

Which TCP/IP utility will produce the following result?

Interface: 199.102.30.152
--------------------------------------------------------------
Internet Address Physical Address Type
199.102.30.152 A0-ee-00-5b-0e-ac dynamic

arp

netstat

tracert

nbtstat

arp

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording