New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! JK0-019 has been withdrawn.

Practice Free JK0-019 CompTIA E2C Network + Certification Exam Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA JK0-019 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA E2C Network + Certification Exam exam materials available for free to everyone. You can take the Free JK0-019 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

The APIPA address 169.254.10.123 falls into which of the following class of addresses?

A.

A

B.

B

C.

C

D.

D

Question # 7

Which of the following exist at layer three of the OSI model? (Select TWO).

A.

NIC

B.

Switch

C.

Frame

D.

Packet

E.

Router

F.

Cable

Question # 8

PKI is a method of user authentication which uses which of the following?

A.

Various router commands

B.

Access control lists

C.

Certificate services

D.

A RADIUS server

Question # 9

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Question # 10

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

A.

Evil twin

B.

War chalking

C.

Buffer overflow

D.

Virus

Question # 11

A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?

A.

Implicit deny

B.

HTTP transports over UDP

C.

Website is down

D.

DNS server failure

Question # 12

Which of the following can use a third party back-end LDAP user database for authentication?

A.

ISAKMP

B.

TACACS+

C.

PKI

D.

CHAP

Question # 13

The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?

A.

WAP placement

B.

MAC address filtering

C.

Content filtering

D.

Encryption type and strength

Question # 14

A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?

A.

Network sniffer

B.

Syslog

C.

SNMPv3

D.

System logs

Question # 15

The network administrator has been tasked to create a network segment where resources can be placed for public web access.

Which of the following should be implemented?

A.

DMZ

B.

Honeynet

C.

PAT

D.

Port security

Question # 16

Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?

A.

WEP cracking

B.

WPA cracking

C.

War driving

D.

Rogue access point

Question # 17

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?

A.

SSID disable

B.

SNMPv3

C.

WEP

D.

WPA2

Question # 18

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?

A.

Protocol analyzer

B.

Syslog server

C.

Packet sniffer

D.

IPS logs

Question # 19

Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted?

A.

Environmental monitor

B.

OTDR

C.

Cable tester

D.

Punch down tool

Question # 20

A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?

A.

Reduce the power input on the replacement servers.

B.

Cover the servers with plastic tarps.

C.

Purchase twice as many servers to create high availability clusters.

D.

Transfer the replacement servers offsite to a data center.

Question # 21

A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?

A.

Protocol analyzer

B.

ipconfig

C.

nslookup

D.

tracert

Question # 22

Which of the following can determine the last time an address lease was renewed on a network device?

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Question # 23

Which of the following is used to explain guidelines for users while using network resources?

A.

Network cut sheet

B.

Baselines

C.

Acceptable use policy

D.

Regulations

Question # 24

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?

A.

Network maps

B.

Traffic analysis

C.

Syslog

D.

ICMP

Question # 25

A network technician suspects that there is an issue with the routing table on a Windows-based server. Which of the following commands will enable the technician to validate this hypothesis?

A.

route print

B.

route

C.

ipconfig

D.

tracert

Question # 26

Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?

A.

Cable tester

B.

Punch down tool

C.

Crimper

D.

Multimeter

Question # 27

A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?

A.

Scope

B.

Reservation

C.

Option

D.

Lease

Question # 28

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?

A.

Signal strength

B.

SSID name

C.

WPA2 encryption

D.

WEP encryption

Question # 29

A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs?

A.

Mirroring

B.

Trunking

C.

Authenticating

D.

Bonding

Question # 30

Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 31

Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?

A.

nslookup

B.

ping

C.

traceroute

D.

route

Question # 32

During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?

A.

Wrong gateway

B.

Failed router

C.

Bad switch module

D.

Incorrect VLAN

Question # 33

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?

A.

The spanning tree protocol is preventing the traffic.

B.

Port Mirroring is set up incorrectly.

C.

The switch needs to be a layer 3 switch.

D.

The traffic is in a classless IP range and not classful IP range.

Question # 34

A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).

A.

That there is strong encryption enabled and configured on the access point.

B.

The user’s home network has a correctly completed WHOIS entry.

C.

The access point is broadcasting the SSID based upon manufacturer’s standards.

D.

There are no conflicts of channels in use by neighboring wireless networks.

E.

There are redundant internal DNS names set in the access point’s settings.

F.

That the access point’s MAC address is properly set in its configuration settings.

Question # 35

Which of the following would allow for a specific device to receive the same IP address from a DHCP server?

A.

Scope

B.

Reservation

C.

Suffix

D.

Lease

Question # 36

Which of the following is used to allow multiple sources on a single optical cable?

A.

HSPA+

B.

MIMO

C.

DWDM

D.

SONET

Question # 37

Which of the following technologies can change channel widths?

A.

802.11a

B.

802.11b

C.

802.11n

D.

Bluetooth

Question # 38

Which of the following WAN technologies has the highest latency?

A.

POTS

B.

Cable

C.

Satellite

D.

DSL

Question # 39

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?

A.

WEP

B.

CCMP

C.

TKIP

D.

CHAP

Question # 40

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?

A.

T1 crossover

B.

Singlemode fiber

C.

CAT6a

D.

Coaxial

Question # 41

Which of the following is the MAXIMUM data transmission rate of 802.11a?

A.

8Mbps

B.

11Mbps

C.

54Mbps

D.

107Mbps

Question # 42

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?

A.

36, 40, 44, 48

B.

36, 44, 52, 60

C.

36, 44, 48, 52

D.

36, 48, 60, 64

Question # 43

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?

A.

Crossover

B.

Rollover

C.

Loopback

D.

Straight cable

Question # 44

Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?

A.

A

B.

B

C.

G

D.

N

Question # 45

Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?

A.

Non-Plenum CAT5

B.

Non-Plenum CAT5e

C.

Plenum CAT5

D.

Plenum CAT5e

Question # 46

Which of the following wireless standards has a maximum rate of less than 50 Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 47

Which of the following cable types is required to run through an air duct?

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Question # 48

Which of the following 802.11 standards transmits the signals the GREATEST distance?

A.

a

B.

b

C.

g

D.

n

Question # 49

Which of the following is the only standard that can operate at either frequency?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 50

At which of the following locations does the responsibility of a Telco provider cease?

A.

IDF

B.

CSU

C.

Demarc

D.

MDF

Question # 51

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?

A.

2.0 GHz at 33 Mbps

B.

2.4 GHz at 54 Mbps

C.

2.4 GHz at 128 Mbps

D.

5.0 GHz at 54 Mbps

Question # 52

Which of the following standards can operate at 40MHz channel spacing?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 53

A small office client is requesting a network redesign. Both wired and wireless devices must connect to the network. All of the wireless devices can communicate using the latest standards. The building has a long courtyard in the middle with reinforced walls, which extends up through all the floors. The distance from the switch to the furthest drop is 88 meters. Which of the following is the correct network redesign choice?

A.

Fiber optic cabling is necessary due to distance limitations.

B.

The wireless network should be 802.11b due to equipment limitations.

C.

One WAP will be sufficient to provide wireless coverage to the floor.

D.

The wired network should be run with at least CAT6 cabling.

Question # 54

MIMO technology in the 802.11n standard provides for which of the following benefits?

A.

Channel expansion

B.

Gigabit wireless bandwidth

C.

Multipath support

D.

Channel bonding

Question # 55

Which of the following wireless standards can transmit data up to 540Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 56

While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?

A.

Toner

B.

Multimeter

C.

Reflectometer

D.

Cable tester

Question # 57

Which of the following connector types is MOST commonly used for serial connections?

A.

MTRJ

B.

RJ-11

C.

RS-232

D.

RJ-45

Question # 58

Which of the following wireless standards is the only one capable of operating in any of the 802.11 wireless spectrums?

A.

A

B.

B

C.

G

D.

N

Question # 59

Which of the following would be considered a Demarc extension?

A.

A patch cable connecting a cable modem with a wireless router

B.

Patch panel wiring

C.

Punch down block wiring

D.

Copper wire connecting the main PSTN point of entry to a wall data outlet

Question # 60

Which of the following technologies is used on cellular networks?

A.

Ethernet

B.

CDMA

C.

CSMA/CA

D.

POTS

Question # 61

Which of the following wireless standards provide speeds up to 150Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 62

Joe, a vendor, walks into a customer’s site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site’s wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem?

A.

The customer’s wireless router uses WPA encryption.

B.

The wireless router at the customer’s site is configured with MAC filtering.

C.

The customer’s WAP uses WEP encryption.

D.

The customer’s IT department blocks all visitors from connecting to their network.

Question # 63

Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue?

A.

Wrong default gateway

B.

Wrong DNS

C.

Switching loop

D.

Power failure

Question # 64

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).

A.

Proxy server

B.

Traffic shaping

C.

Caching engines

D.

Load balancing

E.

Quality of service

Question # 65

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

A.

man-in-the-middle attack

B.

rogue access point

C.

evil twin

D.

packet sniffer

Question # 66

Linking two or more switches together so that they can share VLAN information is known as which of the following?

A.

Port replicating

B.

Filtering

C.

Trunking

D.

Spoofing

Question # 67

After a new user moves furniture into a cubicle, the computer does not connect to the network any longer.

Which of the following would be the MOST likely reason? (Select TWO).

A.

Bad Ethernet switch port

B.

TX/RX reversed

C.

Bad connectors

D.

Bad patch cable

E.

Mismatched MTU

Question # 68

Which of the following is the difference between 802.11b and 802.11g?

A.

Distance

B.

Frequency

C.

Speed

D.

Transmission power

Question # 69

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Question # 70

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?

A.

A 12 port unmanaged switch.

B.

A wired router with an 8 port switch and a WAN port.

C.

A wireless router with an 8 port switch, and a WAN port.

D.

A 8 port firewall with one console port.

Question # 71

A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?

A.

Dipole

B.

Parabolic

C.

Directional

D.

Omni-directional

Question # 72

Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant’s specifications and has always worked without a problem.

You a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following diagram and perform any Necessary changes to the wireless and wired infrastructure by adjusting devices.

NotE. Adjust the LEAST number of devices needed to fix the issue all blue icons in the image are clickable.

JK0-019 question answer

JK0-019 question answer

JK0-019 question answer

JK0-019 question answer

JK0-019 question answer

Question # 73

A technician is reviewing the following company diagram to determine proper connectivity settings:

JK0-019 question answer

Which of the following device configurations is out of specifications?

A.

LaptopC

B.

ServerE

C.

LaptopB

D.

ServerA

E.

PC1

Question # 74

A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?

A.

Power-cycle the computers and switches to re-establish the network connection.

B.

Re-run the network cabling through the ceiling alongside the lights to prevent interference.

C.

Test the wiring in the network jacks for faults using a cable verifier.

D.

Re-run the network cabling so that they are 12 inches or more away from the electrical lines.

Question # 75

A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?

A.

Increase the number of reservations

B.

Increase exclude list

C.

Decrease lease times

D.

Decrease the scope

Question # 76

A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?

A.

SSID mismatch

B.

Incorrect WPA key

C.

Signal bounce

D.

Antenna placement

Question # 77

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?

A.

Configure the main network to Class C

B.

Allow for duplicate IP addresses

C.

Allow the main network to handle DHCP

D.

Create a spanning tree to prevent switching loops

Question # 78

A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?

(1) 1000 foot CAT6 spool

(1) crimper

(1) 16 port gigabit switch

(20) RJ-45 connectors

(12) RJ-45 wall jacks

(1) ____________

A.

Compression tool

B.

Punch down tool

C.

Network map

D.

Multimeter

Question # 79

Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?

A.

Create an ACL on the switches and routers that are dropping SIP and RTP packets.

B.

Create a QoS policy prioritizing users over RTP and SIP traffic.

C.

Create another VLAN for SIP and RTP traffic.

D.

Create a rule to throttle SIP and RTP to 10Kbps or less.

Question # 80

Which of the following should be installed to prevent inappropriate websites from being viewed?

A.

Load balancer

B.

VPN concentrator

C.

Content filter

D.

Proxy server

Question # 81

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?

A.

Load balancer

B.

VPN concentrator

C.

Proxy server

D.

DNS server

Question # 82

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?

A.

Port analyzer

B.

Multimeter

C.

Network sniffer

D.

Cable certifier

Question # 83

Which of the following switches is used with ARP to display the cache entry for a specific IP address?

A.

-a

B.

-d

C.

-g

D.

-s

Question # 84

When implementing video streaming from the Internet to an always on device, it is best to employ which of the following services to minimize latency issues?

A.

QoS

B.

EIGRP

C.

PPTP

D.

OSPF

Question # 85

A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?

A.

QoS

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Question # 86

Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?

A.

Multimode fiber

B.

Setting up a new hot site

C.

Central KVM system

D.

Central UPS system

Question # 87

Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?

A.

Caching

B.

VoIP

C.

QoS

D.

SMTP

Question # 88

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?

A.

QoS

B.

CARP

C.

VLAN

D.

DHCP server

Question # 89

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?

A.

Honeypot

B.

Butt set

C.

Spyware

D.

Blue jacking

Question # 90

Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?

A.

Test the theory

B.

Establish a plan of action

C.

Establish a theory

D.

Document findings

Question # 91

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Question # 92

Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?

A.

Traffic shaping

B.

Proxy server

C.

VPN concentrator

D.

High availability

Question # 93

Which of the following devices acts as a gateway between clients and servers?

A.

WINS server

B.

Proxy server

C.

Content filter

D.

DNS server

Question # 94

Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?

A.

HTTPS

B.

SSH

C.

RSA

D.

SSL

Question # 95

Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?

A.

Port security

B.

IDS

C.

Firewall rules

D.

Switch VLAN assignments

Question # 96

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?

A.

MAC filtering

B.

Digital signatures

C.

MS-CHAP

D.

CHAP

Question # 97

A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:

Biometric fingerprint scan

Complex 12 character password

5 digit pin code authorization

Randomized security question prompt upon login

Which of the following security setups does this company employ?

A.

Single factor authentication

B.

Three factor authentication

C.

Two factor authentication

D.

Single sign-on

Question # 98

Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop?

A.

Enable the host-based firewall on each of the laptops

B.

Use a VPN after connecting to the coffee shop wireless

C.

Edit the SSID connection information and change 'open' to 'shared'

D.

Connect to the open SSID then switch on WPA2 encryption

Question # 99

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

A.

PKI

B.

Kerberos

C.

Single sign-on

D.

CHAP

Question # 100

A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?

A.

The IDS server logs

B.

The DNS resolution time

C.

The firewall’s blocked logs

D.

The patch cable

Question # 101

Which of the following network appliances will only detect and not prevent malicious network activity?

A.

IDS

B.

Network sniffer

C.

IPS

D.

Firewall

Question # 102

Which of the following wireless security measures, although widely implemented, does not provide strong security?

A.

IPSec

B.

WPA2

C.

MAC address filtering

D.

802.1x

Question # 103

An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?

A.

Antivirus scanner

B.

IDS

C.

Packet sniffer

D.

Toner probe

Question # 104

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Question # 105

Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network?

A.

Zone filtering

B.

Signature identification

C.

Port identification

D.

Port scanner

Question # 106

Encryption provides which of the following to data being transferred across the network?

A.

Confidentiality

B.

Resistance to Jitter

C.

High Availability

D.

Data Integrity

Question # 107

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Question # 108

Which of the following is a public class C IP address?

A.

4.2.2.2

B.

194.178.12.54

C.

175.35.46.60

D.

192.168.1.34

Question # 109

Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem?

A.

Default gateway

B.

Duplicate IP address

C.

Wrong DNS

D.

Subnet mask

Question # 110

Hubs are differentiated from switches in that between the two, only hubs have:

A.

a single collision domain.

B.

a single broadcast domain.

C.

multiple collision domains.

D.

multiple broadcast domains.

Question # 111

Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet?

A.

/19

B.

/21

C.

/22

D.

/24

Question # 112

Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port?

A.

123

B.

143

C.

153

D.

163

Question # 113

Which of the following network devices builds a table of ports to MAC addresses to forward packets only to necessary ports?

A.

Switch

B.

Hub

C.

Router

D.

Repeater

Question # 114

A technician wants to separate networks on a switch. Which of the following should be configured to allow this?

A.

VLAN

B.

Trunking

C.

Spanning tree

D.

Traffic filtering

Question # 115

After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process?

A.

Implement the solution to the problem.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Implement preventative measures.

Question # 116

Which of the following port numbers is used for SNMP?

A.

61

B.

151

C.

161

D.

1611

Question # 117

Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?

A.

DNS

B.

DOS

C.

DHCP

D.

DSL

Question # 118

Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:

IP address: 192.168.0.124

Subnet Mask: 255.255.255.128

Default Gateway: 192.168.0.254

Which is MOST likely preventing the user from accessing the Internet?

A.

Duplicate IP address

B.

Incorrect gateway

C.

Incorrect VLAN

D.

Bad switch port

Question # 119

An IP address is encapsulated at which of the following layers of the OSI model?

A.

Transport

B.

Data link

C.

Network

D.

Application

Question # 120

DHCP uses which of the following ports by default?

A.

21

B.

23

C.

68

D.

443

Question # 121

Which of the following uses port 23 by default?

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

Question # 122

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).

A.

UDP 53

B.

UDP 67

C.

UDP 68

D.

TCP 53

E.

TCP 67

F.

TCP 68

Question # 123

At which of the following layers do IP addresses exist?

A.

TCP/IP model Internet layer

B.

OSI model Data Link layer

C.

TCP/IP model Transport layer

D.

OSI model Physical layer

Question # 124

Which of the following STP states indicates an inactivated port due to a loop?

A.

Disabled

B.

Learning

C.

Blocking

D.

Forwarding