We at Crack4sure are committed to giving students who are preparing for the CompTIA JK0-019 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA E2C Network + Certification Exam exam materials available for free to everyone. You can take the Free JK0-019 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
The APIPA address 169.254.10.123 falls into which of the following class of addresses?
Which of the following exist at layer three of the OSI model? (Select TWO).
PKI is a method of user authentication which uses which of the following?
A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following can use a third party back-end LDAP user database for authentication?
The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?
A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?
The network administrator has been tasked to create a network segment where resources can be placed for public web access.
Which of the following should be implemented?
Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?
A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?
Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?
Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted?
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?
Which of the following can determine the last time an address lease was renewed on a network device?
Which of the following is used to explain guidelines for users while using network resources?
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
A network technician suspects that there is an issue with the routing table on a Windows-based server. Which of the following commands will enable the technician to validate this hypothesis?
Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?
A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?
A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?
A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs?
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?
Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?
During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?
An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?
A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).
Which of the following would allow for a specific device to receive the same IP address from a DHCP server?
Which of the following is used to allow multiple sources on a single optical cable?
Which of the following technologies can change channel widths?
Which of the following WAN technologies has the highest latency?
A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?
Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?
Which of the following is the MAXIMUM data transmission rate of 802.11a?
A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?
A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?
Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?
Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?
Which of the following wireless standards has a maximum rate of less than 50 Mbps?
Which of the following cable types is required to run through an air duct?
Which of the following 802.11 standards transmits the signals the GREATEST distance?
Which of the following is the only standard that can operate at either frequency?
At which of the following locations does the responsibility of a Telco provider cease?
Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?
Which of the following standards can operate at 40MHz channel spacing?
A small office client is requesting a network redesign. Both wired and wireless devices must connect to the network. All of the wireless devices can communicate using the latest standards. The building has a long courtyard in the middle with reinforced walls, which extends up through all the floors. The distance from the switch to the furthest drop is 88 meters. Which of the following is the correct network redesign choice?
MIMO technology in the 802.11n standard provides for which of the following benefits?
Which of the following wireless standards can transmit data up to 540Mbps?
While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?
Which of the following connector types is MOST commonly used for serial connections?
Which of the following wireless standards is the only one capable of operating in any of the 802.11 wireless spectrums?
Which of the following would be considered a Demarc extension?
Which of the following technologies is used on cellular networks?
Which of the following wireless standards provide speeds up to 150Mbps?
Joe, a vendor, walks into a customer’s site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site’s wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem?
Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue?
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
Linking two or more switches together so that they can share VLAN information is known as which of the following?
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer.
Which of the following would be the MOST likely reason? (Select TWO).
Which of the following is the difference between 802.11b and 802.11g?
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?
A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?
A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?
Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant’s specifications and has always worked without a problem.
You a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following diagram and perform any Necessary changes to the wireless and wired infrastructure by adjusting devices.
NotE. Adjust the LEAST number of devices needed to fix the issue all blue icons in the image are clickable.





A technician is reviewing the following company diagram to determine proper connectivity settings:

Which of the following device configurations is out of specifications?
A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?
A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?
A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?
A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?
A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?
(1) 1000 foot CAT6 spool
(1) crimper
(1) 16 port gigabit switch
(20) RJ-45 connectors
(12) RJ-45 wall jacks
(1) ____________
Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?
Which of the following should be installed to prevent inappropriate websites from being viewed?
Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?
It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?
Which of the following switches is used with ARP to display the cache entry for a specific IP address?
When implementing video streaming from the Internet to an always on device, it is best to employ which of the following services to minimize latency issues?
A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?
Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?
Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?
A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?
Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
Which of the following devices acts as a gateway between clients and servers?
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?
Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?
A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?
A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:
Biometric fingerprint scan
Complex 12 character password
5 digit pin code authorization
Randomized security question prompt upon login
Which of the following security setups does this company employ?
Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop?
A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?
Which of the following network appliances will only detect and not prevent malicious network activity?
Which of the following wireless security measures, although widely implemented, does not provide strong security?
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network?
Encryption provides which of the following to data being transferred across the network?
Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?
Which of the following is a public class C IP address?
Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem?
Hubs are differentiated from switches in that between the two, only hubs have:
Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet?
Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port?
Which of the following network devices builds a table of ports to MAC addresses to forward packets only to necessary ports?
A technician wants to separate networks on a switch. Which of the following should be configured to allow this?
After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process?
Which of the following port numbers is used for SNMP?
Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?
Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:
IP address: 192.168.0.124
Subnet Mask: 255.255.255.128
Default Gateway: 192.168.0.254
Which is MOST likely preventing the user from accessing the Internet?
An IP address is encapsulated at which of the following layers of the OSI model?
DHCP uses which of the following ports by default?
Which of the following uses port 23 by default?
After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).
At which of the following layers do IP addresses exist?
Which of the following STP states indicates an inactivated port due to a loop?