Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA JK0-023 CompTIA Network+ certification Exam Practice Test

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 111
Total 1112 questions

CompTIA Network+ certification Questions and Answers

Question 1

Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?

Options:

A.

ifconfig

B.

ping

C.

route

D.

nbtstat

Question 2

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?

Options:

A.

Check for switching loops between core and distribution switches.

B.

Check whether an incorrect VLAN has been assigned to the new distribution switch.

C.

Check for inconsistent or missing routes between the core and distribution switches.

D.

Check whether the GBIC was set to multi-mode instead of single-mode SFP.

Question 3

The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue?

Options:

A.

Cable tester

B.

Buttset

C.

Toner probe

D.

Cable certifier

Question 4

Which of the following DNS records is used to identify a domain’s SMTP server?

Options:

A.

CNAME

B.

PTR

C.

MX

D.

A

Question 5

GigSwitch1 is currently configured with a speed of 100 and Duplex is set to Auto on all interfaces. Interface 2 will be connected to GigSwitch2 which is used for all departments. Interface 1 will be used for HR traffic only.

GigSwitch1 needs to be configured with the following parameters:

Configure the necessary protocol to prevent switching loops

Configure GigSwitch1 with a /24 IP address for management

Traffic across Interface 1 needs to be forced to accept and receive up to 100Mbps data at the same time

Traffic across Interface 2 needs to be forced to use Gigabit speeds and maximum performance

Drag and drop the appropriate configurations to their corresponding requirements. All placeholders must be filled. Not all configurations will be used.

Question # 5

Options:

Question 6

Companies trying to cut down on constant documentation of IP addresses could use which of the following?

Options:

A.

Longer lease times

B.

More reservations

C.

Larger scopes

D.

Dynamic IP addressing

Question 7

A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols requires MIBs?

Options:

A.

IPSec

B.

SSL

C.

ISAKMP

D.

SNMP

Question 8

Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO).

Options:

A.

LC

B.

F-connector

C.

DB-9

D.

BNC

E.

RJ-11

F.

SC

Question 9

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?

Options:

A.

WEP

B.

CCMP

C.

TKIP

D.

CHAP

Question 10

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?

Options:

A.

SSID disable

B.

SNMPv3

C.

WEP

D.

WPA2

Question 11

Which of the following is the correct representation of an IPv6 address?

Options:

A.

::

B.

0:0:0:0:0:0:0:0:1

C.

1:2:3:4:AB:CD:EF

D.

2001::4860:800f::

Question 12

Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?

Options:

A.

Proxy server

B.

Content filter

C.

Load balancer

D.

VPN concentrator

Question 13

On which of the following layers of the OSI model does IP operate?

Options:

A.

Session

B.

Transport

C.

Network

D.

Data link

Question 14

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

Options:

A.

Routing loop

B.

MTU black hole

C.

Framing errors

D.

SYN flood

Question 15

Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann’s problem?

Computer_ASwitch_A

IP: 10.0.0.60Int VLAN10

SM: 255.255.255.0IP address 10.0.0.1/28

GW: 10.0.0.1Speed 100 Duplex Full

Options:

A.

Change the duplex on the switch interface to half

B.

Change the speed on the switch interface to 10Mbps

C.

Change the subnet mask of the computer to 255.255.255.240

D.

Change the IP address of the computer to 10.0.0.12

Question 16

Which of the following port numbers needs to be open on a firewall to allow FTP traffic?

Options:

A.

21

B.

22

C.

23

D.

25

Question 17

Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?

Options:

A.

Content filter

B.

VPN concentrator

C.

Load balancer

D.

Proxy server

Question 18

A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?

Options:

A.

SSID mismatch

B.

Incorrect WPA key

C.

Signal bounce

D.

Antenna placement

Question 19

Which of the following can determine the last time an address lease was renewed on a network device?

Options:

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Question 20

Which of the following is used to assign an IP address to a device?

Options:

A.

DHCP

B.

NTP

C.

DNS

D.

RADIUS

Question 21

A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength?

Options:

A.

Call the wireless provider and ask for a T3 circuit.

B.

Move the wireless router to a better location where line of sight is obtained.

C.

Reinstall the operating system to the PC to ensure the newest patches are installed.

D.

Install a hub to ensure there is a clear path for the cables to run.

Question 22

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?

Options:

A.

Port speed

B.

Cryptokey

C.

Data VLAN

D.

NAT/PAT

Question 23

Which of the following is the Telco end of a T1 demarc?

Options:

A.

Smart jack

B.

Network tap

C.

Proxy server

D.

IDF

Question 24

Under each network device, drag and drop the associated broadcast and/or collison description. Objects may be used multiple times, as needed.

Question # 24

Options:

Question 25

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Options:

A.

SYN flood

B.

Teardrop

C.

Smurf

D.

FTP bounce

Question 26

Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key words determined by the company?

Options:

A.

Stateless traffic monitor

B.

Stateful traffic monitor

C.

Signature identification

D.

Content filter

Question 27

A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?

Options:

A.

Single sign-on

B.

Network access control

C.

PKI authentication

D.

Two-factor authentication

Question 28

Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

Options:

A.

PKI

B.

TACACS+

C.

CHAP

D.

SSH

Question 29

Which of the following tools will scan a network for hosts and provide information on the installed operating system?

Options:

A.

DOCSIS

B.

NMAP

C.

IMAP

D.

BERT

Question 30

A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).

Options:

A.

Change the encryption method to WPA

B.

Limit the DHCP scope to only have three addresses total

C.

Enable the SSID broadcast

D.

Enable and configure MAC filtering

E.

Change the broadcast channel to a less commonly used channel

Question 31

Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?

Options:

A.

Host based IPS

B.

Network based firewall

C.

Signature based IDS

D.

Behavior based IPS

Question 32

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

Options:

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Question 33

A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request?

Options:

A.

MAC filtering

B.

IP filtering

C.

Port filtering

D.

Content filtering

Question 34

Which of the following is used to determine whether or not a user’s account is authorized to access a server remotely?

Options:

A.

VPN

B.

RDP

C.

LDAP

D.

Encryption

Question 35

Which of the following network tools is used to identify running services on host devices?

Options:

A.

IDS

B.

IPS

C.

Firewall

D.

NMAP

Question 36

Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?

Options:

A.

MAC filtering

B.

RAS

C.

SSL VPN

D.

L2TP

Question 37

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?

Options:

A.

Behavioral Based IDS

B.

Signature Based IDS

C.

Behavioral Based IPS

D.

Signature Based IPS

Question 38

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed?

Options:

A.

The network address translation IP range.

B.

The signal strength of the router.

C.

The DCHP lease time.

D.

The number of allowable MAC addresses.

Question 39

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

Options:

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

Question 40

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Question 41

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

Options:

A.

Man-in-the-middle

B.

Social engineering

C.

Phishing

D.

DoS

Question 42

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

Options:

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Question 43

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?

Options:

A.

Multi-factor authentication

B.

Two-factor authentication

C.

Biometrics

D.

Single sign-on

Question 44

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

Options:

A.

SNMPv2 access only

B.

TELNET access only

C.

SSH access only

D.

Console access only

Question 45

Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

Options:

A.

Device placement

B.

MAC address filtering

C.

User authentication

D.

Encryption protocols

Question 46

Which of the following tools could attempt to detect operating system vulnerabilities?

Options:

A.

nslookup

B.

honeynet

C.

netstat

D.

nessus

Question 47

Which of the following should be mitigated by employing proper coding techniques when developing software?

Options:

A.

Distributed denial of service attacks

B.

Buffer overflows

C.

War driving

D.

Packet sniffing

Question 48

A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?

Options:

A.

WPA encryption

B.

MAC filtering

C.

Changing antenna type

D.

Decreasing radio strength

Question 49

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

Options:

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Question 50

Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?

Options:

A.

Multimeter

B.

Loopback plug

C.

Cable certifier

D.

CAT3 coupler

Question 51

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?

Options:

A.

RS-232

B.

Rollover cable

C.

Loopback

D.

Point to point cable

Question 52

Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user’s workstation with IP address 192.168.1.45. To identify the workstation’s packets Kim wants to use the workstation’s MAC address. Which of the following protocols would provide the needed information?

Options:

A.

DHCP

B.

ARP

C.

DNS

D.

PING

Question 53

Which of the following network appliances can BEST be described as allowing multiple servers to share requests for a website through the same public IP address?

Options:

A.

VPN concentrator

B.

Content filter

C.

Load balancer

D.

Proxy server

Question 54

Which of the following features can BEST be used to facilitate authorized remote access to a network?

Options:

A.

VPN concentrator

B.

Proxy server

C.

Content filter

D.

Load balancer

Question 55

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

Options:

A.

Increased uptime

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Question 56

An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed?

Options:

A.

Load balancing

B.

VPN concentrator

C.

Caching server

D.

Fault tolerance

Question 57

A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?

Options:

A.

TACACS+

B.

SNMP

C.

Syslog

D.

DOCSIS

Question 58

Jeff, a network technician, arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should Jeff use to attempt to discover the problem?

Options:

A.

Network maps

B.

Change management

C.

Baselines

D.

Cable management

Question 59

Port scanners and packet sniffers differ in functionality because:

Options:

A.

packet sniffers and port scanners are just different names for the same device.

B.

packet sniffers can only log events on traffic activity and port scanners can route malicious packets.

C.

packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain NICs.

D.

port scanners are limited to detecting open ports and packet sniffers watch all traffic.

Question 60

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

Options:

A.

IPS logs

B.

Application logs

C.

IDS logs

D.

History logs

Question 61

After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?

Options:

A.

Multimeter

B.

Cable certifier

C.

Cable tester

D.

Toner probe

Question 62

Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

Options:

A.

Change management

B.

System logs

C.

Asset management

D.

Baselining

Question 63

Which of the following is used to filter outgoing network requests?

Options:

A.

Proxy server

B.

VPN concentrator

C.

DHCP server

D.

IIS server

Question 64

Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company’s T1 Internet access network. Which of the following optimizations should Lisa implement?

Options:

A.

Load balancing

B.

Caching engine

C.

Traffic shaping

D.

Quality of service

Question 65

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

Options:

A.

Hub

B.

VLAN

C.

Router

D.

Server

Question 66

A VPN concentrator is used for which of the following purposes?

Options:

A.

MAC filtering

B.

Content filtering

C.

Secure network access

D.

Connectivity troubleshooting

Question 67

A server that filters traffic between a WAN and a LAN is which of the following?

Options:

A.

Proxy server

B.

RAS server

C.

Default gateway

D.

Email server

Question 68

Which of the following does SNMPv3 BEST provide over previous versions?

Options:

A.

Increased security

B.

Simplified management

C.

More data types

D.

Higher productivity

Question 69

A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?

Options:

A.

arp

B.

nslookup

C.

ipconfig

D.

netstat

Question 70

Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?

Options:

A.

QoS

B.

Fault tolerance

C.

Load balancing

D.

Traffic shaping

Question 71

Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?

Options:

A.

Caching

B.

VoIP

C.

QoS

D.

SMTP

Question 72

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?

Options:

A.

Toner Probe

B.

Punch Down Tool

C.

Protocol Analyzer

D.

Butt Set

Question 73

A patch cable terminated with one end as T568A and the other as T568B will create which of the following cable types?

Options:

A.

Crossover

B.

Serial

C.

Roll over

D.

Straight through

Question 74

An 802.11b wireless network has a maximum data rate of:

Options:

A.

11 Mbps.

B.

20 Mbps.

C.

28 Mbps.

D.

54 Mbps.

Question 75

The network technician needs to install fiber cabling to connect two buildings less than 984 feet (300 meters) apart. Which of the following fiber types should be installed?

Options:

A.

Singlemode

B.

Multimode

C.

Crossover

D.

F-Connector

Question 76

Which of the following connector types would require a punch down tool to attach a network cable to it?

Options:

A.

F-connector

B.

ST

C.

110 block

D.

RJ-45

Question 77

After Karen, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).

Options:

A.

Bad Ethernet switch port

B.

TX/RX reversed

C.

Bad connectors

D.

Bad patch cable

E.

Mismatched MTU

Question 78

Which of the following colors represents the outer leads on a connector head of a 568B patch cable? (Select TWO).

Options:

A.

Blue, brown/white

B.

Green/white, blue

C.

Orange/white, orange

D.

Blue, blue/white

E.

Brown/white, brown

Question 79

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

Options:

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Question 80

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?

Options:

A.

Broadcast storm

B.

TX/RX cables reversed

C.

Mismatched MTU

D.

Incorrect routing table

Question 81

Which of the following network topologies is MOST likely used in remote access VPN?

Options:

A.

Point to Point

B.

Bus

C.

Ring

D.

Mesh

Question 82

Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 83

Which of the following connectors would be found on a fiber optic cable?

Options:

A.

BNC

B.

RJ-11

C.

RS-232

D.

MTRJ

Question 84

Which of the following cable types would have the LEAST amount of EMI?

Options:

A.

CAT3

B.

CAT5

C.

STP CAT6

D.

Plenum CAT6

Question 85

Which of the following cable types is required to run through an air duct?

Options:

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Question 86

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

Options:

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Question 87

When examining a suspected faulty copper network cable, Kim, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

Options:

A.

DB loss

B.

Dispersion

C.

Collisions

D.

Cross-talk

Question 88

Which of the following uses a ring topology?

Options:

A.

DSL

B.

Ethernet

C.

DOCSIS

D.

SONET

Question 89

Which of the following technologies is used on cellular networks?

Options:

A.

Ethernet

B.

CDMA

C.

CSMA/CA

D.

POTS

Question 90

A technician is tasked with replacing some older RS-232 serial printers. Which of the following ports would the technician most likely find on these printers?

Options:

A.

BNC

B.

DB-9

C.

LC

D.

RJ-11

Question 91

A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Question 92

Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?

Options:

A.

CSMA/CA

B.

CSMA/CD

C.

Wireless encryption

D.

Wireless bonding

Question 93

Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

Options:

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Question 94

Which of the following cable types is MOST commonly used with POTS?

Options:

A.

CAT3

B.

Multimode

C.

CAT6

D.

Coaxial

Question 95

Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?

Options:

A.

Router

B.

MDF

C.

IDF

D.

Demarc

Question 96

In which of the following would Sandy, a technician, find the LARGEST number of 110 block patch panels?

Options:

A.

MDF

B.

Caching engines

C.

Demarc

D.

IDF

Question 97

Kurt, a user, cannot access any network resources. The technician has determined that the problem is isolated to Kurt, and that there have not been any changes to his workstation or switch port recently. Which of the following steps in the troubleshooting methodology should the technician do NEXT?

Options:

A.

Establish a plan of action to resolve the problem.

B.

Implement preventative measures.

C.

Implement the solution or escalate as necessary.

D.

Establish a theory of probable cause.

Question 98

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?

Options:

A.

Document findings

B.

Identify the problem

C.

Escalate the problem

D.

Establish a plan of action

Question 99

Which of the following has the LEAST amount of collisions in a domain?

Options:

A.

Bridge

B.

Hub

C.

Repeater

D.

Switch

Question 100

Which of the following describes the amount of time it takes for a packet to transmit from one switch to another?

Options:

A.

Hop count

B.

Latency

C.

MTU limit

D.

Distance vector

Question 101

Which of the following protocols does DNS utilize on port 53?

Options:

A.

TCP

B.

FTP

C.

RTP

D.

ICMP

Question 102

Which of the following protocols is MOST commonly associated with VoIP?

Options:

A.

LDAP

B.

HTTPS

C.

SIP

D.

SCP

Question 103

Which of the following BEST describes a switch port?

Options:

A.

Broadcast domain

B.

Distance vector

C.

Link state

D.

Collision domain

Question 104

Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:

Options:

A.

Virtual desktops.

B.

Switches.

C.

PBXs.

D.

Virtual servers.

Question 105

If a NIC does not have a link light, there is a failure at which of the following OSI layers?

Options:

A.

Physical

B.

Session

C.

Data link

D.

Presentation

Question 106

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?

Options:

A.

Escalate the problem

B.

Identify potential effects

C.

Test the theory to determine cause

D.

Establish a plan of action to resolve the problem

Question 107

Which of the following is a link state routing protocol?

Options:

A.

RIPv2

B.

BGP

C.

IS-IS

D.

RIP

Question 108

A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols?

Options:

A.

HTTPS

B.

POP3

C.

SSH

D.

SMTP

Question 109

Which of the following uses eight groups of characters for addressing?

Options:

A.

MAC

B.

IPv4

C.

IPv6

D.

DHCP

Question 110

Which of the following would Kim, a technician, use in voice over IP communications?

Options:

A.

SNTP

B.

SCP

C.

SMTP

D.

SIP

Question 111

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model?

Options:

A.

Transport

B.

Application

C.

Internet

D.

Network Interface

Question 112

Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?

Options:

A.

RIP

B.

OSPF

C.

BGP

D.

RIPv2

Question 113

Which of the following defines an IP address that is NOT routed on the Internet?

Options:

A.

Multicast

B.

Public

C.

Private

D.

Classful

Question 114

In order for switching loops to be automatically disabled, which of the following needs to be implemented?

Options:

A.

Routing tables

B.

Collision domains

C.

Port mirroring

D.

Spanning-tree protocol

Question 115

In which of the following layers of the OSI model would MAC addressing be found?

Options:

A.

Network

B.

Application

C.

Data Link

D.

Transport

Question 116

Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections?

Options:

A.

BGP

B.

SNAT

C.

RIP

D.

GPG

Question 117

Which of the following routing protocols utilizes the DUAL algorithm for determining best path?

Options:

A.

EIGRP

B.

RIPv2

C.

OSPF

D.

RIP

Question 118

A forward lookup zone converts which of the following?

Options:

A.

IP addresses to hostnames

B.

Hostnames to IP addresses

C.

MAC addresses to IP addresses

D.

IP Addresses to MAC addresses

Question 119

Which of the following exist at layer three of the OSI model? (Select TWO).

Options:

A.

NIC

B.

Switch

C.

Frame

D.

Packet

E.

Router

F.

Cable

Question 120

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).

Options:

A.

UDP 53

B.

UDP 67

C.

UDP 68

D.

TCP 53

E.

TCP 67

F.

TCP 68

Page: 1 / 111
Total 1112 questions