New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! JK0-023 has been withdrawn.

Practice Free JK0-023 CompTIA Network+ certification Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA JK0-023 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Network+ certification exam materials available for free to everyone. You can take the Free JK0-023 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

A.

IPS logs

B.

Application logs

C.

IDS logs

D.

History logs

Question # 7

Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?

A.

Multimode fiber

B.

Setting up a new hot site

C.

Central KVM system

D.

Central UPS system

Question # 8

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?

A.

Protocol analyzer

B.

Syslog server

C.

Packet sniffer

D.

IPS logs

Question # 9

A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).

A.

Change the encryption method to WPA

B.

Limit the DHCP scope to only have three addresses total

C.

Enable the SSID broadcast

D.

Enable and configure MAC filtering

E.

Change the broadcast channel to a less commonly used channel

Question # 10

Which of the following describes a rationale for a network with redundant paths?

A.

VPN compatibility

B.

Unified communications implementation

C.

High availability requirement

D.

QoS

Question # 11

A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future?

A.

Change management

B.

Cable management

C.

Asset management

D.

Setting baselines

Question # 12

A public website using round robin DNS is an example of:

A.

load balancing.

B.

QoS.

C.

caching engines.

D.

traffic shaping.

Question # 13

Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

A.

Change management

B.

System logs

C.

Asset management

D.

Baselining

Question # 14

Which of the following network devices hides network nodes behind one public IP address?

A.

Layer 3 switch

B.

Content filter

C.

VPN server

D.

Proxy server

Question # 15

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

A.

Asset management

B.

Baselines

C.

Network maps

D.

Change management

Question # 16

A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Lisa, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement?

A.

Syslog

B.

RADIUS

C.

IPSec

D.

Network sniffer

Question # 17

Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach’s theory?

A.

Traffic analysis

B.

SNMP

C.

History logs

D.

System logs

Question # 18

The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators?

A.

Asset management

B.

System baselines

C.

System logging

D.

Change management

Question # 19

Port scanners and packet sniffers differ in functionality because:

A.

packet sniffers and port scanners are just different names for the same device.

B.

packet sniffers can only log events on traffic activity and port scanners can route malicious packets.

C.

packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain NICs.

D.

port scanners are limited to detecting open ports and packet sniffers watch all traffic.

Question # 20

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

A.

Hub

B.

VLAN

C.

Router

D.

Server

Question # 21

Which of the following protocols uses port 3389 by default?

A.

RDP

B.

TFTP

C.

IMAP

D.

DNS

Question # 22

In which of the following layers of the OSI model does the TCP protocol operate?

A.

Session

B.

Network

C.

Data link

D.

Transport

Question # 23

Which of the following DNS records would be queried to locate a company’s mail server?

A.

A

B.

MX

C.

AAAA

D.

CNAME

Question # 24

Which of the following are considered unsecure access methods? (Select TWO).

A.

FTP

B.

IPSec

C.

RCP

D.

SCP

E.

SFTP

Question # 25

Logically separating the ports on a switch without physically separating them can be done using which of the following?

A.

Routing tables

B.

Hub logic

C.

Spanning tree protocol

D.

VLANs

Question # 26

Which of the following DNS record types provides the hostname to IP address mapping?

A.

A record

B.

NS record

C.

CNAME record

D.

MX record

Question # 27

Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?

A.

The transport OSI model layer and the transport TCP/IP model layer.

B.

The transport OSI model layer and the Internet TCP/IP model layer.

C.

The network OSI model layer and the transport TCP/IP model layer.

D.

The network OSI model layer and the Internet TCP/IP model layer.

Question # 28

Frame relay occurs at which of the following layers of the OSI model?

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 6

Question # 29

Which of the following is the MAXIMUM data transmission rate of 802.11a?

A.

8Mbps

B.

11Mbps

C.

54Mbps

D.

107Mbps

Question # 30

Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections?

A.

BGP

B.

SNAT

C.

RIP

D.

GPG

Question # 31

Which of the following is an example of a CSMA/CD medium?

A.

WEP

B.

SONET

C.

Token ring

D.

Ethernet

Question # 32

The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?

A.

Smart jack

B.

MDF

C.

VPN

D.

66 block

Question # 33

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Question # 34

A patch cable terminated with one end as T568A and the other as T568B will create which of the following cable types?

A.

Crossover

B.

Serial

C.

Roll over

D.

Straight through

Question # 35

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Question # 36

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Question # 37

Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 38

The location where the Telco wiring stops and the clients wiring starts is known as the:

A.

MDF.

B.

demarc.

C.

IDF.

D.

66 block.

Question # 39

Which of the following is the FASTEST Ethernet technology?

A.

10GBaseSR

B.

10BaseT

C.

100BaseFX

D.

1000BaseT

Question # 40

The selection of the correct punch down tool to use depends on which of the following?

A.

Connector type

B.

Demarcation point location

C.

Block type

D.

Switch location

Question # 41

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Question # 42

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

A.

Combined DNS and DHCP hosting

B.

Encryption

C.

Content filtering

D.

Fault tolerance

E.

Website caching

Question # 43

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

A.

Redundancy

B.

Fault tolerance

C.

Unified communications

D.

Data integrity requirements

Question # 44

After Karen, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).

A.

Bad Ethernet switch port

B.

TX/RX reversed

C.

Bad connectors

D.

Bad patch cable

E.

Mismatched MTU

Question # 45

Which of the following standards can operate at 40MHz channel spacing?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 46

Which of the following connectors is used for coaxial copper cable?

A.

BNC

B.

DB-9

C.

RJ-11

D.

ST

Question # 47

A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:

Biometric fingerprint scan

Complex 12 character password

5 digit pin code authorization

Randomized security question prompt upon login

Which of the following security setups does this company employ?

A.

Single factor authentication

B.

Three factor authentication

C.

Two factor authentication

D.

Single sign-on

Question # 48

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?

A.

Signal strength

B.

SSID name

C.

WPA2 encryption

D.

WEP encryption

Question # 49

Which of the following is a form of encrypting packets for safe, secure data transmission within a network?

A.

RAS

B.

PPTP

C.

IPSec

D.

ICA

Question # 50

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?

A.

Packet sniffing

B.

Packet filter

C.

Stateful inspection

D.

Content filter

Question # 51

Which of the following provides RSA encryption at the session layer?

A.

SSH

B.

ISAKMP

C.

SSL

D.

TLS

Question # 52

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

A.

Evil twin

B.

War chalking

C.

Buffer overflow

D.

Virus

Question # 53

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.192

D.

255.255.255.248

Question # 54

Which of the following OSI layers BEST describes where an HTTP proxy operates?

A.

Transport

B.

Application

C.

Presentation

D.

Session

Question # 55

Which of the following is a purpose of a VLAN?

A.

Decreases bandwidth on a network

B.

Segments broadcast traffic

C.

Increases port speed

D.

Allows another connection to the router

Question # 56

Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (Select TWO).

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Question # 57

Which of the following is considered a routing metric?

A.

Hop count

B.

QoS

C.

Subnet size

D.

IP address

Question # 58

A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?

A.

Network maps

B.

Change management

C.

Log analysis

D.

Protocol analyzer

Question # 59

Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?

A.

PoE settings and VTP configuration

B.

SNMP configuration only

C.

IP address and SNMP configuration

D.

QoS and PoE settings

Question # 60

Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?

A.

traceroute

B.

tracert

C.

ifconfig

D.

ipconfig

Question # 61

Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?

A.

TXRX is reversed

B.

Faulty crossover cable

C.

Incorrect WEP key

D.

A short in the cable pairs

Question # 62

Which of the following WAN technologies uses an analog phone line to transmit data?

A.

LTE

B.

DSL

C.

Satellite

D.

Cable

Question # 63

After installing a SOHO wireless router, Joe, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s public interface IP address. Which of the following must Joe implement to assign a different public IP from the router’s public interface IP address to one of the workstations in the office?

A.

NAT

B.

PAT

C.

DMZ

D.

ACL

Question # 64

Ann, a user, connects to her company’s secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?

A.

Rogue access point

B.

ARP poisoning

C.

Replay attack

D.

Evil twin

Question # 65

Which of the following has the HIGHEST data rate speed?

A.

T1

B.

ADSL

C.

SDSL

D.

OC-3

Question # 66

Which of the following is a packet switching WAN technology?

A.

Frame relay

B.

T1

C.

Asynchronous transfer mode

D.

ISDN

Question # 67

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Question # 68

Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?

A.

Cable has been looped too many times.

B.

Cable has a twist tie attached too close to the connector.

C.

Cable is too warm.

D.

Cable is run too close to a fluorescent light.

Question # 69

Karen, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Question # 70

Which of the following is an example of two-factor authentication?

A.

A username and PIN

B.

A username and password

C.

A username, password, finger print scan, and smart card

D.

A username, password, and key fob number

Question # 71

Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?

A.

A

B.

B

C.

G

D.

N

Question # 72

Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?

A.

Man-in-the-middle

B.

Denial of service

C.

Ping flooding

D.

Smurfing

Question # 73

A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?

A.

Honeynet

B.

Signature based IPS

C.

Behavior based IPS

D.

Host based IPS

Question # 74

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?

A.

An IP filtering ACL

B.

A MAC filtering ACL

C.

A port filtering ACL

D.

A class matching ACL

Question # 75

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Question # 76

Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

A.

Device placement

B.

MAC address filtering

C.

User authentication

D.

Encryption protocols

Question # 77

Which of the following is a social engineering attack?

A.

Worms

B.

Man-in-the-middle

C.

Phishing

D.

Evil twin

Question # 78

Which of the following tools will scan a network for hosts and provide information on the installed operating system?

A.

DOCSIS

B.

NMAP

C.

IMAP

D.

BERT

Question # 79

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

Question # 80

Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key words determined by the company?

A.

Stateless traffic monitor

B.

Stateful traffic monitor

C.

Signature identification

D.

Content filter

Question # 81

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

A.

Increased uptime

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Question # 82

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Question # 83

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

A.

VLAN

B.

MPLS

C.

VPN

D.

PSTN

Question # 84

In the event of a fire in an office building, which of the following cable types should be installed to prevent toxic gas from burning PVC cable coatings?

A.

CAT6a

B.

Plenum

C.

Crossover

D.

STP

Question # 85

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

A.

100 kilometers (62 miles)

B.

10 kilometers (6 miles)

C.

1000 meters (3281 feet)

D.

100 meters (328 feet)

Question # 86

Which of the following cable types is MOST commonly used with POTS?

A.

CAT3

B.

Multimode

C.

CAT6

D.

Coaxial

Question # 87

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?

A.

Improper grounding

B.

TXRX reversed

C.

Incorrect termination

D.

Outdated NIC drivers

Question # 88

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?

A.

The spanning tree protocol is preventing the traffic.

B.

Port Mirroring is set up incorrectly.

C.

The switch needs to be a layer 3 switch.

D.

The traffic is in a classless IP range and not classful IP range.

Question # 89

Which of the following differentiates a layer 3 switch from a layer 2 switch?

A.

Routing

B.

Bridging

C.

Switching

D.

Repeating

Question # 90

Which of the following protocols is the BEST choice for retrieving email on multiple devices?

A.

IMAP4

B.

SMTP

C.

FTP

D.

SNMPv3

Question # 91

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step?

A.

Identify the problem

B.

Question the user

C.

Establish a plan of action

D.

Establish a theory of probable cause

Question # 92

Which of the following uses a 128-bit addressing scheme?

A.

MAC

B.

DHCP

C.

IPv4

D.

IPv6

Question # 93

Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).

A.

21

B.

22

C.

23

D.

53

E.

67

Question # 94

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?

A.

Document findings

B.

Identify the problem

C.

Escalate the problem

D.

Establish a plan of action

Question # 95

Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet?

A.

/19

B.

/21

C.

/22

D.

/24

Question # 96

Which of the following is a reason to use dynamic DNS?

A.

The host IP address is not listed in the firewall.

B.

The host IP address is assigned by DHCP.

C.

Static routes cannot be used on the host network.

D.

A third-party certificate is being used.

Question # 97

A technician would like to connect two separate LAN networks at a small business for a short period of time, to share files. The connection needs to be temporary, and is physically impossible using standard network cabling. Which of the following is the BEST way to connect the networks in this situation?

A.

Wireless repeater

B.

Wireless bridge

C.

Bluetooth

D.

RADIUS server

Question # 98

Frequency, channel bonding, and MIMO configuration are all characteristics of which of the following networking technologies?

A.

Wi-Fi

B.

SONET

C.

T1/E1 Internet

D.

Satellite Internet

Question # 99

A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check?

A.

The arp table of the new customer’s router.

B.

The route table of the next-hop router.

C.

The route table of the new customer’s router.

D.

The arp table of a network user.

Question # 100

Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?

A.

MDF

B.

66 block

C.

IDF

D.

Patch panel

Question # 101

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Question # 102

Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running?

A.

CAT5

B.

CAT6

C.

Coaxial

D.

Fiber

Question # 103

Which of the following protocols can be implemented to provide encryption during transmission between email gateways?

A.

TLS

B.

PPTP

C.

SSH

D.

HTTPS

Question # 104

Which of the following wireless standards provide speeds up to 150Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 105

When a loop occurs, which of the following STP components determines which port to disable?

A.

Convergence

B.

Root bridge

C.

BPDU guard

D.

MAC address

Question # 106

Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?

A.

Alter the domain account login policies to reflect the most common application rule sets.

B.

Ensure that the user accounts are properly configured in domain services.

C.

Implement a software solution that facilitates single sign-on authentication.

D.

Increase the time between mandatory password changes by a factor of three.

Question # 107

Spanning-Tree Protocol is used with which of the following network devices?

A.

Router

B.

NIC

C.

Switch

D.

DHCP server

Question # 108

Which of the following wireless standards can transmit data up to 540Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 109

Which of the following protocols provides a secure connection between two networks?

A.

L2TP

B.

IPSec

C.

PPP

D.

PPTP

Question # 110

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?

A.

80

B.

445

C.

3000

D.

3389

Question # 111

Which of the following ports is used by Telnet?

A.

21

B.

23

C.

80

D.

143

Question # 112

Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

A.

Network map

B.

Environmental monitor

C.

Placement map

D.

Syslog

Question # 113

Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use?

A.

Toner probe

B.

Punch down

C.

Wire tester

D.

Crimper

Question # 114

An administrator wants to translate an internal workstation name to an IP address. Which of the following commands would be used?

A.

ifconfig

B.

nslookup

C.

netstat

D.

ipconfig

Question # 115

The network technician has recently implemented VLANs on the company network. Ever since this implementation, sections within the company can no longer share information. While troubleshooting, the technician realizes they are unable to ping a device from another VLAN. Which of the following needs to be configured to fix this problem?

A.

Clear the ARP table

B.

Add host entries on the user’s computer

C.

Configure 802.1x trunks on the switches

D.

Configure 802.1q trunks on the switches

Question # 116

Which of the following methods for network performance optimization is used to distribute traffic among similar devices?

A.

Fault tolerance

B.

QoS

C.

Proxy server

D.

Load balancing

Question # 117

Which of the following network protocols is used for a secure command line interface for management of network devices?

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Question # 118

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?

A.

Load balancer

B.

VPN concentrator

C.

Proxy server

D.

DNS server

Question # 119

A company has a server with redundant power supplies. Which of the following is this an example of?

A.

Traffic shaping

B.

Caching engines

C.

Fault tolerance

D.

Load balancing

Question # 120

A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?

A.

Caching

B.

Asset management

C.

Traffic shaping

D.

High availability