New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA JK0-019 Dumps Questions Answers

Page: 1 / 31
Total 828 questions

CompTIA E2C Network + Certification Exam Questions and Answers

Question 1

Frame relay occurs at which of the following layers of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 6

Buy Now
Question 2

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?

Options:

A.

RADIUS

B.

DNS

C.

DHCP

D.

IDS

Question 3

Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?

Options:

A.

Faulty GBIC

B.

Faulty SFP

C.

Cable is a crossover

D.

VLAN mismatch

Question 4

A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements?

Options:

A.

A firewall

B.

A router

C.

A hub

D.

A Layer 2 switch

Question 5

Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer?

Options:

A.

2

B.

3

C.

4

D.

5

Question 6

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Question 7

Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released?

Options:

A.

DHCP lease

B.

DNS suffix

C.

Subnet mask

D.

DHCP reservation

Question 8

Which of the following TCP/IP model layers does the OSI model Presentation layer map to?

Options:

A.

Transport

B.

Internet

C.

Application

D.

Network Interface

Question 9

Which of the following is the definition of a DNS server?

Options:

A.

Hosts proprietary business applications

B.

Translates FQDN’s to IP addresses

C.

Provides network IDS/IPS security

D.

Assigns IP addresses to network devices

Question 10

Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO).

Options:

A.

200.200.100.0/28

B.

200.200.100.32/27

C.

200.200.100.63/27

D.

200.200.100.79/27

E.

200.200.100.95/27

F.

200.200.100.254/30

Question 11

A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask?

Options:

A.

/26

B.

/27

C.

/28

D.

/29

Question 12

Which of the following protocols is used to detect and eliminate switching loops within a network?

Options:

A.

Spanning Tree Protocol

B.

EIGRP

C.

OSPF

D.

Dynamic routing

Question 13

The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).

Options:

A.

Network

B.

Session

C.

Transport

D.

Physical

E.

Data link

Question 14

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).

Options:

A.

172.16.0.255

B.

172.16.0.0

C.

172.16.1.1

D.

172.16.8.0

E.

172.16.256.255

Question 15

192.168.0.7/8 notation denotes which of the following IPv4 subnet masks?

Options:

A.

255.0.0.0

B.

255.255.0.0

C.

255.255.255.0

D.

255.255.255.255

Question 16

Which of the following DNS records must be queried to resolve the IPv6 address of a website?

Options:

A.

CNAME

B.

PTR

C.

AAAA

D.

A

Question 17

A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic?

Options:

A.

Duplex settings

B.

SNMP string

C.

VLAN assignments

D.

Spanning tree

Question 18

Which of the following protocols occurs at Layer 4 of the OSI model?

Options:

A.

ISDN

B.

IPX

C.

GRE

D.

UDP

Question 19

Which of the following protocols is used to send time synchronization updates on a given network?

Options:

A.

NTP

B.

POP3

C.

DNS

D.

IMAP

Question 20

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion:

msgUsername:

msgAuthenticationParameters:

msgPrivacyParameters:

msgData:

data: get-request

request-iD.

error-status: noError (0)

error-index: 0

variable-bindings: 0 items

Options:

A.

SNMPv3

B.

SSH

C.

HTTP

D.

SNMPv1

Question 21

Which of the following protocols is used to transfer files over the Internet?

Options:

A.

SNMP

B.

NTP

C.

FTP

D.

SIP

Question 22

Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO).

Options:

A.

Hub

B.

Switch

C.

MAC address

D.

IP address

E.

Router

Question 23

A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?

Options:

A.

Escalate to the management team

B.

Change the IP address back to its previous state

C.

Test the theory by analyzing logs

D.

Create a plan of action to present to management

Question 24

On which of the following OSI model layers would a MAC address be used?

Options:

A.

Network

B.

Data Link

C.

Transport

D.

Physical

Question 25

Which of the following operate at the Data Link layer of the OSI model? (Select TWO).

Options:

A.

MAC address

B.

Router

C.

Hub

D.

Switch

E.

IP address

Question 26

Which of the following are authentication methods that can use AAA authentication? (Select TWO).

Options:

A.

Kerberos

B.

PKI

C.

TKIP/AES

D.

MS-CHAP

E.

RADIUS

F.

TACACS+

Question 27

The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?

Options:

A.

PAT

B.

DHCP

C.

DMZ

D.

NAT

Question 28

An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)

Options:

A.

20

B.

21

C.

22

D.

23

E.

25

F.

53

Question 29

A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering?

Options:

A.

CAT5e connection between offices via the patch panel located in building’s communication closet.

B.

CAT5e cable run through ceiling in the public space between offices.

C.

VPN between routers located in each office space.

D.

A WEP encrypted wireless bridge with directional antennae between offices.

Question 30

A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:

Biometric fingerprint scan

Complex 12 character password

5 digit pin code authorization

Randomized security question prompt upon login

Which of the following security setups does this company employ?

Options:

A.

Single factor authentication

B.

Three factor authentication

C.

Two factor authentication

D.

Single sign-on

Question 31

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

Options:

A.

Allow ANY to 192.168.0.15 port 21

B.

Allow ANY to 192.168.0.15 port 22

C.

Allow ANY to 192.168.0.15 port 80

D.

Allow ANY to ANY port ANY

Question 32

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

Options:

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Question 33

Which of the following protocols provides a secure connection between two networks?

Options:

A.

L2TP

B.

IPSec

C.

PPP

D.

PPTP

Question 34

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

Options:

A.

PKI

B.

Kerberos

C.

Single sign-on

D.

CHAP

Question 35

Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?

Options:

A.

Caching

B.

Load balancing

C.

Port filtering

D.

Traffic analyzer

Question 36

A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?

Options:

A.

QoS

B.

Install 802.11n WAP

C.

PoE

D.

Parabolic antenna

Question 37

A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?

Options:

A.

Change management

B.

Asset management

C.

Network sniffer

D.

System logs

Question 38

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?

Options:

A.

Managed

B.

Software

C.

Hardware

D.

Wireless

Question 39

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?

Options:

A.

An IP filtering ACL

B.

A MAC filtering ACL

C.

A port filtering ACL

D.

A class matching ACL

Question 40

When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?

Options:

A.

Implement multiple wireless encryption techniques.

B.

Implement PoE on each WAP.

C.

Decrease signal strength.

D.

Increase signal strength.

Question 41

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?

User’s IP: 192.168.5.14

Server IP: 192.168.5.17

Firewall rules:

Permit 192.168.5.16/28192.168.5.0/28

Permit 192.168.5.0/24192.168.4.0/24

Permit 192.168.4.0/24192.168.5.0/24

Deny 192.168.5.0/28192.168.5.16/28

Deny 192.168.14.0/24192.168.5.16/28

Deny 192.168.0.0/24192.168.5.0/24

Options:

A.

Deny 192.168.0.0/24192.168.5.0/24

B.

Deny 192.168.5.0/28192.168.5.16/28

C.

Deny 192.168.14.0/24192.168.5.16/28

D.

Implicit Deny rule

Question 42

Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?

Options:

A.

WPA2-CCMP

B.

WPA

C.

WEP

D.

WPA2-TKIP

Question 43

Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?

Options:

A.

110

B.

123

C.

143

D.

443

Question 44

Which of the following are considered AAA authentication methods? (Select TWO).

Options:

A.

Kerberos

B.

Radius

C.

MS-CHAP

D.

TACACS+

E.

802.1X

Question 45

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

Options:

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Question 46

Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?

Options:

A.

IP filtering

B.

Port filtering

C.

MAC address filtering

D.

DHCP lease

Question 47

A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?

Options:

A.

Implicit deny

B.

HTTP transports over UDP

C.

Website is down

D.

DNS server failure

Question 48

Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?

Options:

A.

Deny any source host on source port 23 to destination any

B.

Deny any source network 1.1.1.0/24 to destination any on port 23

C.

Deny source host 1.1.12 on source port 23 to destination any

D.

Deny any source network 1.1.1.0/24 with source port 23 to destination any

Question 49

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

Options:

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Question 50

Which of the following uses SSL encryption?

Options:

A.

SMTP

B.

FTP

C.

HTTPS

D.

SNMP

Question 51

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?

Options:

A.

T1 crossover

B.

Singlemode fiber

C.

CAT6a

D.

Coaxial

Question 52

Which of the following wireless standards provide speed of 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 53

Which of the following connector types would require a punch down tool to attach a network cable to it?

Options:

A.

F-connector

B.

ST

C.

110 block

D.

RJ-45

Question 54

Which of the following types of connectors is used with a CAT6 Ethernet cable?

Options:

A.

RJ-45

B.

BNC

C.

RJ-11

D.

DB-9

Question 55

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

Options:

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Question 56

A technician tests a cable going to the patch panel and notices the following output from the cable tester:

1------------------1

2------------------2

3------------------3

4------------------4

5------------------5

6------------------6

7------------------7

8------------------8

On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue?

Options:

A.

White Orange

B.

Solid Brown

C.

Solid Orange

D.

White Green

Question 57

A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?

Options:

A.

Premise router

B.

ISP router

C.

Smart jack

D.

CSU/DSU

Question 58

A technician is assigned the task of connecting two buildings 125 meters apart (410 ft.). Which of the following cable types should the technician consider?

Options:

A.

CAT5e Cable

B.

CAT5 Cable

C.

Plenum

D.

Single mode fiber

Question 59

The unit responsible for the successful shaping and transmission of a digital signal is called:

Options:

A.

demarc.

B.

T1 hub.

C.

smart jack.

D.

CSU/DSU.

Question 60

Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 61

Which of the following would be used to connect a singlemode fiber cable to a CAT6 connection?

Options:

A.

Media converter

B.

T1-crossover

C.

Multimode cable

D.

Coaxial

Question 62

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?

Options:

A.

36, 40, 44, 48

B.

36, 44, 52, 60

C.

36, 44, 48, 52

D.

36, 48, 60, 64

Question 63

A technician can increase the bandwidth of an 802.11n cell by:

Options:

A.

doubling the channel width.

B.

enabling diversity.

C.

disabling MIMO.

D.

adding a second access point.

Question 64

Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires?

Options:

A.

Coaxial

B.

CAT3

C.

CAT5

D.

CAT6a

Question 65

802.11n can operate at which of the following frequencies? (Select TWO).

Options:

A.

2.4Mhz

B.

2.5Mhz

C.

5Mhz

D.

2.4Ghz

E.

2.5Ghz

F.

5Ghz

Question 66

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?

Options:

A.

Crosstalk

B.

Bad connectors

C.

Wrong DNS

D.

Duplicate IP address

Question 67

A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?

Options:

A.

dB loss

B.

Distance

C.

Incorrect connector type

D.

EMI

E.

Crosstalk

Question 68

A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings.

Which of the following methods provides this functionality?

Options:

A.

Use WAP auto-configuration

B.

Use a wireless controller

C.

Use PXE to load and track WAPs

D.

Use DHCP scope options

Question 69

Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps?

Options:

A.

MIMO technology

B.

Channel bonding

C.

Encryption type

D.

Frequency

Question 70

Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:

Options:

A.

Virtual desktops.

B.

Switches.

C.

PBXs.

D.

Virtual servers.

Question 71

A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Question 72

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?

Options:

A.

Ring

B.

Star

C.

Bus

D.

Mesh

Question 73

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 74

Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?

Options:

A.

Dual frequency

B.

Enhanced encryption

C.

MIMO technology

D.

Backwards compatibility

Question 75

Which of the following technologies is used to connect public networks using POTS lines?

Options:

A.

OC3

B.

OC12

C.

PSTN

D.

Cable

Question 76

A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?

Access Point 1Access Point 2

802.11g802.11b

Encryption: WPA2Encryption: WEP

Channel: 1Channel: 7

SSID. CompanyWiFiSSID. Visitor

Options:

A.

Change the SSID on Access Point 2 to OPEN.

B.

Disable SSID broadcasting on Access Point 1.

C.

Change the encryption on Access Point 2 to WPA2.

D.

Remove the WEP encryption from Access Point 2.

Question 77

A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?

Options:

A.

Interference

B.

Configuration

C.

Incorrect MTU size

D.

Incorrect IP

Question 78

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).

Options:

A.

Proxy server

B.

Traffic shaping

C.

Caching engines

D.

Load balancing

E.

Quality of service

Question 79

Which of the following connectors is usable in SFP modules?

Options:

A.

ST

B.

LC

C.

LX

D.

SX

Question 80

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?

Options:

A.

The spanning tree protocol is preventing the traffic.

B.

Port Mirroring is set up incorrectly.

C.

The switch needs to be a layer 3 switch.

D.

The traffic is in a classless IP range and not classful IP range.

Question 81

Which of the following is needed when using WPA2-Enterprise wireless encryption?

Options:

A.

TFTP

B.

RADIUS

C.

LDAP

D.

IPSec

Question 82

A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?

Options:

A.

Power-cycle the computers and switches to re-establish the network connection.

B.

Re-run the network cabling through the ceiling alongside the lights to prevent interference.

C.

Test the wiring in the network jacks for faults using a cable verifier.

D.

Re-run the network cabling so that they are 12 inches or more away from the electrical lines.

Question 83

Which of the following can be used to limit wireless network access to a single computer?

Options:

A.

Configure PPP

B.

Packet sniffing

C.

MAC address filtering

D.

Omni-directional antennas

Question 84

During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?

Options:

A.

Wrong gateway

B.

Failed router

C.

Bad switch module

D.

Incorrect VLAN

Question 85

Which of the following is the reason why a company’s network may contain a DHCP server?

Options:

A.

To assign IP addresses to devices on the network

B.

To convert IP addresses to fully qualified domain names

C.

To provide POP3 and IMAP email functionality

D.

To allow secure remote access

Question 86

A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex?

Options:

A.

Transmission speed

B.

Frequency

C.

Auto-negotiate

D.

Distance

Question 87

Which of the following performance benefits would multiple domain controllers BEST provide?

Options:

A.

Fault tolerance

B.

Caching engine

C.

Proxy server

D.

Quality of service

Question 88

Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network.

Which of the following settings is incorrect on the client?

Options:

A.

The mode is incorrect

B.

SSID Mismatch

C.

Incorrect WEP Key

D.

Channel is set incorrectly

Question 89

A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO).

Options:

A.

Channel

B.

Encryption

C.

Diversity

D.

SSID broadcast

E.

Frequency

Question 90

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?

Options:

A.

Signal strength

B.

SSID name

C.

WPA2 encryption

D.

WEP encryption

Question 91

A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).

Options:

A.

That there is strong encryption enabled and configured on the access point.

B.

The user’s home network has a correctly completed WHOIS entry.

C.

The access point is broadcasting the SSID based upon manufacturer’s standards.

D.

There are no conflicts of channels in use by neighboring wireless networks.

E.

There are redundant internal DNS names set in the access point’s settings.

F.

That the access point’s MAC address is properly set in its configuration settings.

Question 92

Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?

Options:

A.

Reservations

B.

Suffixes

C.

Leases

D.

Gateways

Question 93

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?

Options:

A.

Signal strength

B.

SSID mismatch

C.

Channel mismatch

D.

Encryption mismatch

Question 94

After a new user moves furniture into a cubicle, the computer does not connect to the network any longer.

Which of the following would be the MOST likely reason? (Select TWO).

Options:

A.

Bad Ethernet switch port

B.

TX/RX reversed

C.

Bad connectors

D.

Bad patch cable

E.

Mismatched MTU

Question 95

A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?

Options:

A.

The proxy server is set incorrectly.

B.

The Ethernet cable is pinched.

C.

The network gateway is set incorrectly.

D.

The IP address is set incorrectly.

Question 96

A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?

Options:

A.

96W

B.

168W

C.

240W

D.

369.6W

Question 97

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?

Options:

A.

Document findings

B.

Identify the problem

C.

Escalate the problem

D.

Establish a plan of action

Question 98

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Options:

A.

NetBIOS name filtering

B.

IP address filtering

C.

MAC address filtering

D.

Computer name filtering

Question 99

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

Options:

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

Question 100

A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?

Options:

A.

Wrong encryption type

B.

SSID mismatch

C.

Signal bounce

D.

Incorrect channel

Question 101

Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?

Options:

A.

dig

B.

nbtstat

C.

netstat

D.

ping

Question 102

A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?

Options:

A.

Network baseline

B.

Tracert

C.

System logs

D.

Protocol analyzer

Question 103

A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario?

Options:

A.

Protocol analyzer

B.

Punch down tool

C.

Multimeter

D.

Toner probe

Question 104

Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?

Options:

A.

Traffic shaping

B.

Proxy server

C.

VPN concentrator

D.

High availability

Question 105

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?

Options:

A.

Toner probe

B.

Loopback plug

C.

Protocol analyzer

D.

Multimeter

Question 106

Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network?

Options:

A.

Wire schemes

B.

Change management

C.

Network diagrams

D.

System baselines

Question 107

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?

Options:

A.

Content filter

B.

Packet filter

C.

IPS

D.

IDS

Question 108

After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?

Options:

A.

Implement preventative measures.

B.

Establish a plan of action to resolve the problem.

C.

Establish a theory of probable cause.

D.

Implement the solution or escalate as necessary.

Question 109

A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?

Options:

A.

Cable certifier

B.

Throughput tester

C.

Loopback plug

D.

Multimeter

Question 110

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?

Options:

A.

Network maps

B.

Traffic analysis

C.

Syslog

D.

ICMP

Question 111

A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

Options:

A.

WINS

B.

QoS

C.

NAT

D.

DHCP

Question 112

A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?

Options:

A.

Verify full system functionality

B.

Identify the problem

C.

Establish a theory

D.

Implement the solution

Question 113

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Question 114

In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

Options:

A.

NMAP

B.

ping

C.

nslookup

D.

tracert

Question 115

A user’s workstation is experiencing multiple errors when trying to open programs. Which of the following log files should the technician review to assist in troubleshooting these errors?

Options:

A.

History Log

B.

Application Log

C.

System Log

D.

Security Log

Question 116

A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?

Options:

A.

Router firewall

B.

Ping and traceroute

C.

Throughput tester

D.

Protocol analyzer

Question 117

A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?

Options:

A.

ipconfig

B.

nslookup

C.

dig

D.

tracert

Question 118

Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?

Options:

A.

Multimeter

B.

OTDR

C.

Link state

D.

Protocol analyzer

Question 119

Which of the following network protocols is used for a secure command line interface for management of network devices?

Options:

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Question 120

A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE).

Options:

A.

WEP

B.

PoE

C.

VLANs

D.

SSL VPN

E.

IDS

F.

QoS

Question 121

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?

Options:

A.

Protocol analyzer

B.

Syslog server

C.

Packet sniffer

D.

IPS logs

Question 122

Which of the following configuration management documents is used to describe how a computer performs after initial installation onto a network?

Options:

A.

Baseline

B.

Network map

C.

Asset management

D.

Installation guide

Question 123

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Question 124

Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?

Options:

A.

netstat

B.

ipconfig

C.

ping

D.

traceroute

Page: 1 / 31
Total 828 questions