March Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA JK0-019 CompTIA E2C Network + Certification Exam Exam Practice Test

Note! Following JK0-019 Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 83
Total 828 questions

CompTIA E2C Network + Certification Exam Questions and Answers

Question 1

A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?

Options:

A.

Two-factor authentication

B.

Biometric security

C.

Multi-factor authentication

D.

Single factor authentication

Question 2

Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?

Options:

A.

HTTPS

B.

SSH

C.

RSA

D.

SSL

Question 3

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

Options:

A.

SSL

B.

IPSec

C.

Kerberos

D.

RDP

E.

L2TP

F.

PPTP

Question 4

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?

User’s IP: 192.168.5.14

Server IP: 192.168.5.17

Firewall rules:

Permit 192.168.5.16/28192.168.5.0/28

Permit 192.168.5.0/24192.168.4.0/24

Permit 192.168.4.0/24192.168.5.0/24

Deny 192.168.5.0/28192.168.5.16/28

Deny 192.168.14.0/24192.168.5.16/28

Deny 192.168.0.0/24192.168.5.0/24

Options:

A.

Deny 192.168.0.0/24192.168.5.0/24

B.

Deny 192.168.5.0/28192.168.5.16/28

C.

Deny 192.168.14.0/24192.168.5.16/28

D.

Implicit Deny rule

Question 5

An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?

Options:

A.

Packet filtering

B.

Spam filtering

C.

MAC filtering

D.

CSU

Question 6

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

Options:

A.

Packet filtering

B.

Hardware firewalls

C.

Port security

D.

Stateful inspection

Question 7

A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?

Options:

A.

ISAKMP

B.

Port forwarding

C.

Port security

D.

Port mirroring

Question 8

An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?

Options:

A.

Antivirus scanner

B.

IDS

C.

Packet sniffer

D.

Toner probe

Question 9

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?

Options:

A.

MAC filtering

B.

Digital signatures

C.

MS-CHAP

D.

CHAP

Question 10

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

Options:

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Question 11

The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following?

Options:

A.

MAC filtering

B.

Traffic shaping

C.

Session filtering

D.

IP filtering

Question 12

Which of the following would a network administrator use to scan a network for vulnerabilities?

Options:

A.

ICMP

B.

NMAP

C.

ACL

D.

TCPDUMP

Question 13

Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots?

Options:

A.

Social engineering

B.

War chalking

C.

WPA cracking

D.

Packet sniffing

Question 14

A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?

Options:

A.

Behavior based IPS

B.

Signature based IDS

C.

Antivirus software

D.

Access Control Lists

Question 15

A network technician is configuring a new firewall for placement into an existing network infrastructure. The existing network is connected to the Internet by a broadband connection. Which of the following represents the BEST location for the new firewall?

Options:

A.

The firewall should be placed between the Internet connection and the local network.

B.

The firewall should be placed inside the local network.

C.

The firewall should be placed between the broadband connection and the Internet.

D.

The firewall should be placed in the Internet cloud.

Question 16

Which of the following is used to determine whether or not a user’s account is authorized to access a server remotely?

Options:

A.

VPN

B.

RDP

C.

LDAP

D.

Encryption

Question 17

Which of the following security appliances are used to only identify traffic on individual systems?

Options:

A.

Host based IPS

B.

Application based IPS

C.

Network based IDS

D.

Host based IDS

Question 18

PKI is a method of user authentication which uses which of the following?

Options:

A.

Various router commands

B.

Access control lists

C.

Certificate services

D.

A RADIUS server

Question 19

Which of the following uses SSL encryption?

Options:

A.

SMTP

B.

FTP

C.

HTTPS

D.

SNMP

Question 20

If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network?

Options:

A.

Device placement

B.

Wireless standard

C.

Encryption type

D.

MAC filtering

Question 21

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

Options:

A.

Man-in-the-middle

B.

Social engineering

C.

Phishing

D.

DoS

Question 22

A user authenticated to more than one website using their same credentials is an example of:

Options:

A.

Multifactor authentication

B.

User access control

C.

Two-factor authentication

D.

Single sign-on

Question 23

A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?

Options:

A.

Single sign-on

B.

Network access control

C.

PKI authentication

D.

Two-factor authentication

Question 24

Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?

Options:

A.

DoS attack

B.

Man-in-the-middle attack

C.

Smurf attack

D.

Xmas attack

Question 25

An administrator would like to block all HTTP traffic and allow all HTTPS traffic on the firewall. Using the default port numbers, which of the following should the administrator configure? (Select TWO).

Options:

A.

Allow port 443

B.

Deny port 53

C.

Deny port 20

D.

Deny port 80

E.

Allow port 23

Question 26

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?

Options:

A.

The spanning tree protocol is preventing the traffic.

B.

Port Mirroring is set up incorrectly.

C.

The switch needs to be a layer 3 switch.

D.

The traffic is in a classless IP range and not classful IP range.

Question 27

A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT?

Options:

A.

Question users to determine if anything has changed

B.

Re-establish theory of probable cause

C.

Escalate problem to upper management

D.

Document replacement of power supply

Question 28

A user is on a network with two upstream connections to the Internet and is experiencing intermittent issues while connecting to websites. Some websites are available but others are not. Which of the following is the MOST likely cause of the condition?

Options:

A.

Incorrect VLAN assignment

B.

Bad or missing routes

C.

Switching loop

D.

Wrong subnet mask

Question 29

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

Options:

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Question 30

Which of the following is a value that can be received from a DHCP server?

Options:

A.

Bootp server address

B.

SMTP server address

C.

WWW server address

D.

VPN server address

Question 31

Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?

Building ABuilding BBuilding C

Channel: 1Channel: 6Channel: 11

Encryption: WPA2Encryption: OpenEncryption: WPA2

SSID. CorpSSID. GuestSSID. Sales

Options:

A.

Change Channel in Building B to 7

B.

Change Encryption in Building B to match A and C

C.

Change Channel in Building C to 1

D.

Change SSID in Building C to match Building A

Question 32

A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?

Options:

A.

Signal strength

B.

Interference

C.

AP placement

D.

Incorrect SSID

Question 33

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?

Options:

A.

MIMO

B.

AP isolation

C.

Channel bonding

D.

Burst mode

Question 34

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?

Options:

A.

Signal strength

B.

SSID mismatch

C.

Channel mismatch

D.

Encryption mismatch

Question 35

Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?

Options:

A.

Reservations

B.

Suffixes

C.

Leases

D.

Gateways

Question 36

A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?

Options:

A.

MPLS

B.

Caching engines

C.

QoS

D.

Load balancing

Question 37

Which of the following performance benefits would multiple domain controllers BEST provide?

Options:

A.

Fault tolerance

B.

Caching engine

C.

Proxy server

D.

Quality of service

Question 38

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?

Options:

A.

Use two combined Internet/router/wireless devices, one in each house.

B.

Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house.

C.

Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.

D.

Use a single combined Internet/router/wireless device at the guest house.

Question 39

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?

Options:

A.

Switch the channel

B.

Change frequencies

C.

Channel bonding

D.

Increase the signal

Question 40

A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?

Options:

A.

The proxy server is set incorrectly.

B.

The Ethernet cable is pinched.

C.

The network gateway is set incorrectly.

D.

The IP address is set incorrectly.

Question 41

When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?

Options:

A.

802.1q

B.

Collision avoidance

C.

Port mirroring

D.

STP

Question 42

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?

Options:

A.

Port filtering

B.

WEP

C.

MAC address filtering

D.

PoE

Question 43

A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?

Options:

A.

Interference

B.

Configuration

C.

Incorrect MTU size

D.

Incorrect IP

Question 44

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Options:

A.

NetBIOS name filtering

B.

IP address filtering

C.

MAC address filtering

D.

Computer name filtering

Question 45

Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?

Options:

A.

MDF

B.

66 block

C.

IDF

D.

Patch panel

Question 46

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?

Options:

A.

Encryption type

B.

SSID

C.

IP address

D.

Channel

Question 47

A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?

Options:

A.

Increase the number of reservations

B.

Increase exclude list

C.

Decrease lease times

D.

Decrease the scope

Question 48

An IP address assigned from a DHCP server is said to be which of the following?

Options:

A.

Hybrid

B.

Dynamic

C.

Secure

D.

Static

Question 49

Which of the following antenna types has a flat circular radiation pattern?

Options:

A.

Diversity

B.

Yagi

C.

Omni

D.

Patch

Question 50

Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?

Options:

A.

STP

B.

Port Mirroring

C.

VLANs

D.

PoE

Question 51

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Question 52

A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?

Options:

A.

nbstat

B.

arp

C.

nslookup

D.

ipconfig

Question 53

Which of the following switches is used with ARP to display the cache entry for a specific IP address?

Options:

A.

-a

B.

-d

C.

-g

D.

-s

Question 54

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?

Options:

A.

Honeypot

B.

Butt set

C.

Spyware

D.

Blue jacking

Question 55

Which of the following requires congestion to occur before enabling traffic prioritization?

Options:

A.

Quality of Service

B.

IGMP snooping

C.

Flow control

D.

WAN optimization

Question 56

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Question 57

Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?

Options:

A.

Test the theory

B.

Establish a plan of action

C.

Establish a theory

D.

Document findings

Question 58

An administrator can use packet tags to configure which of the following?

Options:

A.

VLAN

B.

NAT

C.

PoE

D.

QoS

Question 59

A content filter is MOST likely installed on which of the following servers?

Options:

A.

Proxy server

B.

TACACS+ server

C.

DNS server

D.

DHCP server

Question 60

A technician is troubleshooting a network connectivity issue on a laptop. The technician wants to verify the NIC is functioning on the laptop. Which of the following commands should the technician use?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.0.1

C.

tracert 192.168.0.1

D.

nslookup 10.4.0.1

Question 61

A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?

Options:

A.

Network maps

B.

Change management

C.

Log analysis

D.

Protocol analyzer

Question 62

In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

Options:

A.

NMAP

B.

ping

C.

nslookup

D.

tracert

Question 63

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?

Options:

A.

Port analyzer

B.

Multimeter

C.

Network sniffer

D.

Cable certifier

Question 64

A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario?

Options:

A.

Protocol analyzer

B.

Punch down tool

C.

Multimeter

D.

Toner probe

Question 65

Which of the following tools allows an administrator to identify a cable?

Options:

A.

Multimeter

B.

Cable stripper

C.

Toner

D.

Punch down tool

Question 66

After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?

Options:

A.

Implement preventative measures.

B.

Establish a plan of action to resolve the problem.

C.

Establish a theory of probable cause.

D.

Implement the solution or escalate as necessary.

Question 67

A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?

Options:

A.

TACACS+

B.

SNMP

C.

Syslog

D.

DOCSIS

Question 68

Which of the following would a technician do to monitor remote traffic through an access point?

Options:

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Question 69

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?

Options:

A.

Load balancing

B.

Traffic policing

C.

Caching engines

D.

Traffic shaping

Question 70

When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?

Options:

A.

ping

B.

nbtstat

C.

arp

D.

msconfig

Question 71

A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use?

Options:

A.

ipconfig /a

B.

ping -t

C.

ping -a

D.

netstat

Question 72

A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?

Options:

A.

Change management

B.

Baselines

C.

Asset management

D.

Cable management

Question 73

Which of the following BEST describes a load balancer?

Options:

A.

A device that splits traffic between multiple nodes of a clustered service.

B.

A device that allows multiple computers to access the internet through a single public IP address.

C.

A device that filters internet content based on rules and ACLs.

D.

A device that separates users onto separate WAPs for even distribution.

Question 74

A network technician suspects that there is an issue with the routing table on a Windows-based server. Which of the following commands will enable the technician to validate this hypothesis?

Options:

A.

route print

B.

route

C.

ipconfig

D.

tracert

Question 75

An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario?

Options:

A.

Phone communications

B.

Web site downloads

C.

Streaming video clients

D.

Client bittorrent abilities

Question 76

A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?

Options:

A.

Use content filtering

B.

Install and configure IDS

C.

Enable MAC address filtering

D.

Enable RAS on the network firewall

Question 77

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?

Options:

A.

36, 40, 44, 48

B.

36, 44, 52, 60

C.

36, 44, 48, 52

D.

36, 48, 60, 64

Question 78

At which of the following locations does the responsibility of a Telco provider cease?

Options:

A.

IDF

B.

CSU

C.

Demarc

D.

MDF

Question 79

Which of the following network topologies is MOST likely used in remote access VPN?

Options:

A.

Point to Point

B.

Bus

C.

Ring

D.

Mesh

Question 80

Management wants to be sure that the existing wiring infrastructure conforms to CAT5e standards.

Which of the following is the correct tool?

Options:

A.

Cable certifier

B.

Cable tester

C.

OTDR

D.

Protocol analyzer

Question 81

A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO).

Options:

A.

Loopback plug

B.

Multimeter

C.

OTDR

D.

Crimper

E.

Cable tester

F.

TDR

Question 82

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?

Options:

A.

Configure Wi-Fi Multimedia support

B.

Use only 20 MHz channel bandwidth

C.

Enable band steering to use 802.11n

D.

Configure Quality of Service

Question 83

A technician is sorting patch cables into four bins labeled coaxial, crossover, straight-through, and fiber. The technician has a cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of the cable start with a green wire. Into which of the following bins should this cable be placed?

Options:

A.

Crossover

B.

Fiber

C.

Straight-through

D.

Coaxial

Question 84

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?

Options:

A.

Crossover

B.

Rollover

C.

Loopback

D.

Straight cable

Question 85

Which of the following network topologies describes a network where each node is connected to multiple devices?

Options:

A.

Mesh

B.

Bus

C.

Star

D.

Ring

Question 86

Which of the following WAN technologies has the highest latency?

Options:

A.

POTS

B.

Cable

C.

Satellite

D.

DSL

Question 87

Which of the following is a common LAN protocol used for a SOHO?

Options:

A.

ATM

B.

DSL

C.

Ethernet

D.

HDLC

Question 88

Which of the following is a requirement for bridging with 802.11a?

Options:

A.

WPA encryption

B.

Governmental licenses

C.

High gain yagi antennas

D.

Clear line of sight

Question 89

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

Options:

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Question 90

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Question 91

Which of the following network media connectors can use a MAXIMUM of two copper wire pairs?

Options:

A.

F-connector

B.

RJ-11

C.

MTRJ

D.

RJ-45

Question 92

A cable with visible space between the ends of the copper wires and the RJ-45 connector will cause which of the following problems to occur?

Options:

A.

EMI

B.

Short

C.

Reversed TXRX

D.

dB loss

Question 93

Which of the following WAN technologies uses an analog phone line to transmit data?

Options:

A.

LTE

B.

DSL

C.

Satellite

D.

Cable

Question 94

Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?

Options:

A.

A

B.

B

C.

G

D.

N

Question 95

Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?

Options:

A.

BNC connection

B.

110 block

C.

Plenum

D.

LC connector

Question 96

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?

Options:

A.

MDF

B.

VPN

C.

RDP

D.

IDF

Question 97

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

Options:

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Question 98

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?

Options:

A.

2.0 GHz at 33 Mbps

B.

2.4 GHz at 54 Mbps

C.

2.4 GHz at 128 Mbps

D.

5.0 GHz at 54 Mbps

Question 99

Which of the following connectors is used for coaxial copper cable?

Options:

A.

BNC

B.

DB-9

C.

RJ-11

D.

ST

Question 100

Which of the following is used to allow multiple sources on a single optical cable?

Options:

A.

HSPA+

B.

MIMO

C.

DWDM

D.

SONET

Question 101

Which of the following describes a manually entered route?

Options:

A.

Static

B.

Dynamic

C.

Multicast

D.

Unicast

Question 102

Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?

Options:

A.

250

B.

254

C.

255

D.

256

Question 103

Which of the following uses port 23 by default?

Options:

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

Question 104

Which of the following is the definition of a DNS server?

Options:

A.

Hosts proprietary business applications

B.

Translates FQDN’s to IP addresses

C.

Provides network IDS/IPS security

D.

Assigns IP addresses to network devices

Question 105

Which of the following is the unit used to transfer information at Layer 2 of the OSI model?

Options:

A.

Packet

B.

Socket

C.

Session

D.

Frame

Question 106

The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).

Options:

A.

Network

B.

Session

C.

Transport

D.

Physical

E.

Data link

Question 107

A user arrives at a new house and the Internet provider states the connection will run through the cable. If the user wants to install multiple PCs, which of the following will the user need in order to establish a connection? (Select TWO).

Options:

A.

VPN

B.

Router

C.

T1 card

D.

WEP

E.

Modem

Question 108

A company pays a third-party vendor a monthly fee to connect to offsite servers and desktops. Users connect to the desktops via RDP, and administrators connect to the servers via VPN. Servers and desktops are hardware-based. Which of the following is the third-party providing?

Options:

A.

Virtual desktops

B.

Virtual servers

C.

NaaS

D.

SaaS

Question 109

Which of the following would be considered a Class C private address?

Options:

A.

10.0.0.125

B.

192.168.50.125

C.

192.169.0.132

D.

255.255.255.0

Question 110

At which of the following layers do frames exist? (Select TWO).

Options:

A.

OSI model Data link layer

B.

TCP/IP model Network Interface layer

C.

OSI model Physical layer

D.

OSI model Network layer

E.

TCP/IP model Internet layer

Question 111

Which of the following protocols works at the LOWEST layer of the OSI model?

Options:

A.

L2TP

B.

PPTP

C.

ISAKMP

D.

IPSec

Question 112

A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer’s IP addresses:

192.168.2.70

192.168.2.100

192.168.2.125

192.168.2.130

When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do?

Options:

A.

Change the IP of 192.168.2.130 to 192.168.1.128.

B.

Change the IP of 192.168.2.130 to 192.168.2.126.

C.

Change the default gateway of 192.168.2.130 accordingly.

D.

Reconfigure the switch for the right VLAN.

Question 113

Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer?

Options:

A.

2

B.

3

C.

4

D.

5

Question 114

Which of the following DHCP properties defines the size of the pool of available IP addresses?

Options:

A.

Options

B.

Scope

C.

Leases

D.

Reservations

Question 115

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using?

Options:

A.

Telnet

B.

RADIUS

C.

SSH

D.

SNMP

Question 116

Which of the following correctly lists the layers of the OSI model starting at Layer 1?

Options:

A.

Data Link, Physical, Network, Transport, Presentation, Session, Application.

B.

Physical, Data Link, Network, Transport, Presentation, Session, Application.

C.

Physical, Data Link, Transport, Network, Session, Presentation, Application.

D.

Physical, Data Link, Network, Transport, Session, Presentation, Application.

Question 117

Which of the following protocols exchange the latest information that has changed in the routing table?

Options:

A.

TFTP

B.

BGP

C.

OSPF

D.

IGMP

Question 118

Which of the following uses a 128-bit addressing scheme?

Options:

A.

MAC

B.

DHCP

C.

IPv4

D.

IPv6

Question 119

Which of the following OSI layers allows users to access network services such as file sharing?

Options:

A.

Layer 1

B.

Layer 3

C.

Layer 4

D.

Layer 7

Question 120

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).

Options:

A.

TFTP

B.

SNMP

C.

POP3

D.

IMAP4

E.

SFTP

Question 121

Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:

IP address: 192.168.0.124

Subnet Mask: 255.255.255.128

Default Gateway: 192.168.0.254

Which is MOST likely preventing the user from accessing the Internet?

Options:

A.

Duplicate IP address

B.

Incorrect gateway

C.

Incorrect VLAN

D.

Bad switch port

Question 122

Which of the following protocols are used to provide accurate time to network devices?

Options:

A.

SMTP

B.

FTP

C.

TLS

D.

NTP

Question 123

Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?

Options:

A.

ping

B.

netstat

C.

route

D.

arp

Question 124

Which of the following BEST describes the definition of DHCP?

Options:

A.

DHCP is utilized to dynamically lease IP addresses to hosts.

B.

DHCP is utilized to statically lease IP address to hosts.

C.

DHCP is utilized to permanently lease IP address dynamically to hosts.

D.

DHCP is utilized to permanently lease IP address statically to hosts.

Page: 1 / 83
Total 828 questions