Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

JK0-019 Sample Questions Answers

Questions 4

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?

Options:

A.

QoS

B.

CARP

C.

VLAN

D.

DHCP server

Buy Now
Questions 5

Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?

Options:

A.

Traffic shaping

B.

Proxy server

C.

VPN concentrator

D.

High availability

Buy Now
Questions 6

Which of the following should be used when throughput to the destination network is a priority?

Options:

A.

MTU

B.

Hop count

C.

Reliability of the path

D.

Bandwidth

Buy Now
Questions 7

Which of the following network protocols is used to resolve FQDNs to IP addresses?

Options:

A.

DNS

B.

FTP

C.

DHCP

D.

APIPA

Buy Now
Questions 8

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

Options:

A.

Application

B.

Physical

C.

Presentation

D.

Transport

E.

Data Link

F.

Network

Buy Now
Questions 9

Which IEEE protocol is used with VLAN technology?

Options:

A.

802.11a

B.

802.11b

C.

802.1m

D.

802.1q

Buy Now
Questions 10

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

Options:

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Buy Now
Questions 11

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

Options:

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Buy Now
Questions 12

A technician is tasked with rewiring a CAT5e SOHO network with 10 existing computers. The users are currently running at 100 Mbps and would like to be upgraded to 1000 Mbps. Which of the following should the technician do FIRST?

Options:

A.

Upgrade the existing computers

B.

Purchase a new 802.11ac access point and install.

C.

Install CAT6 wiring for the SOHO network

D.

Verify the network cards can support 1Gbps

Buy Now
Questions 13

Which of the following is an example of a CSMA/CD medium?

Options:

A.

WEP

B.

SONET

C.

Token ring

D.

Ethernet

Buy Now
Questions 14

A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT?

Options:

A.

Question users to determine if anything has changed

B.

Re-establish theory of probable cause

C.

Escalate problem to upper management

D.

Document replacement of power supply

Buy Now
Questions 15

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?

Options:

A.

Set the VLAN preferences on the host's NIC

B.

Create each VLAN on the host's virtual switch

C.

Change the virtual machine NIC settings from private to bridged

D.

Create each VLAN on the host's gateway router

Buy Now
Questions 16

Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?

Options:

A.

Create a MAC filter containing the current users.

B.

Turn off SSID broadcast.

C.

Change the encryption type to AES 256-bit for current users.

D.

Reduce the signal strength to 0 percent.

Buy Now
Questions 17

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

Options:

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Buy Now
Questions 18

Which of the following would a technician do to monitor remote traffic through an access point?

Options:

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Buy Now
Questions 19

Which of the following network topologies is MOST commonly used by online file sharing websites?

Options:

A.

Point to multipoint

B.

Peer-to-peer

C.

Ring

D.

Hybrid

Buy Now
Questions 20

A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?

Options:

A.

Honeynet

B.

Signature based IPS

C.

Behavior based IPS

D.

Host based IPS

Buy Now
Questions 21

The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?

Options:

A.

PAT

B.

DHCP

C.

DMZ

D.

NAT

Buy Now
Questions 22

Which of the following authentication methods is MOST secure?

Options:

A.

NTLM

B.

CHAP

C.

MS-CHAP

D.

Kerberos

Buy Now
Questions 23

A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?

Options:

A.

The IDS server logs

B.

The DNS resolution time

C.

The firewall’s blocked logs

D.

The patch cable

Buy Now
Questions 24

An administrator would like to provide outside access to the company web server and separate the traffic from the local network. Which of the following would the administrator use to accomplish this?

Options:

A.

Network Address Translation

B.

Stateful Inspection

C.

Port Address Translation

D.

Demilitarized Zone

Buy Now
Questions 25

A company wants to have a security zone to isolate traffic within the firewall. Which of the following could be used?

Options:

A.

VPN

B.

ACL

C.

DMZ

D.

VLAN

Buy Now
Questions 26

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

Buy Now
Questions 27

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Buy Now
Questions 28

The network administrator has been tasked to create a network segment where resources can be placed for public web access.

Which of the following should be implemented?

Options:

A.

DMZ

B.

Honeynet

C.

PAT

D.

Port security

Buy Now
Questions 29

Which of the following a network technician would use to reverse engineer malware and virus?

Options:

A.

IDS

B.

VLAN

C.

Virtual Machine

D.

Switch

Buy Now
Questions 30

Which of the following devices allows for multiple web servers to host the same web page and for traffic to be distributed between them according to some metric?

Options:

A.

Proxy server

B.

VPN concentrator

C.

Load balancer

D.

Content filter

Buy Now
Questions 31

A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?

Options:

A.

Multimeter

B.

Cable tester

C.

Lineman's handset

D.

Toner probe

Buy Now
Questions 32

Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?

Options:

A.

DNS server

B.

Content filter

C.

Proxy server

D.

Load balancer

Buy Now
Questions 33

When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?

Options:

A.

802.1q

B.

Collision avoidance

C.

Port mirroring

D.

STP

Buy Now
Questions 34

A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?

Options:

A.

Dipole

B.

Parabolic

C.

Directional

D.

Omni-directional

Buy Now
Questions 35

Which of the following configurations of a wireless network would be considered MOST secure?

Options:

A.

WEP using MAC Filtering

B.

WEP and hiding the SSID

C.

WPA2

D.

WPA TKIP and hiding the SSID

Buy Now
Questions 36

Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots?

Options:

A.

Social engineering

B.

War chalking

C.

WPA cracking

D.

Packet sniffing

Buy Now
Questions 37

A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?

Options:

A.

MAC filtering

B.

Port filtering

C.

IP filtering

D.

ACL filtering

Buy Now
Questions 38

Which of the following should be installed to prevent inappropriate websites from being viewed?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Content filter

D.

Proxy server

Buy Now
Questions 39

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

Options:

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Buy Now
Questions 40

The company’s main server is using 98% of its available resources and Joe needs to evenly distribute the work to another server using which of the following?

Options:

A.

VPN concentrator

B.

Content filter

C.

Proxy server

D.

Load balancer

Buy Now
Questions 41

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

Options:

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Buy Now
Questions 42

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?

Options:

A.

Toner probe

B.

Loopback plug

C.

Protocol analyzer

D.

Multimeter

Buy Now
Questions 43

A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?

Options:

A.

QoS

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Buy Now
Questions 44

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?

Options:

A.

Content filter

B.

Packet filter

C.

IPS

D.

IDS

Buy Now
Questions 45

A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?

Options:

A.

Interference

B.

Configuration

C.

Incorrect MTU size

D.

Incorrect IP

Buy Now
Questions 46

Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?

Options:

A.

STP

B.

Port Mirroring

C.

VLANs

D.

PoE

Buy Now
Questions 47

A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?

Options:

A.

Duplicate IP addresses

B.

Bad GBIC

C.

Wrong gateway

D.

Switching loop

Buy Now
Questions 48

A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch?

Options:

A.

VLAN

B.

PoE

C.

VTP

D.

QoS

Buy Now
Questions 49

Which of the following would allow for a specific device to receive the same IP address from a DHCP server?

Options:

A.

Scope

B.

Reservation

C.

Suffix

D.

Lease

Buy Now
Questions 50

A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user’s office. Which of the following would MOST likely cause them to lose their connection?

Options:

A.

Encryption type

B.

Disabled wireless adapter

C.

SSID mismatch

D.

Interference

Buy Now
Questions 51

A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions?

Options:

A.

Signal strength latency

B.

Bouncing signal

C.

Interference

D.

Crosstalk

Buy Now
Questions 52

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?

Options:

A.

A 12 port unmanaged switch.

B.

A wired router with an 8 port switch and a WAN port.

C.

A wireless router with an 8 port switch, and a WAN port.

D.

A 8 port firewall with one console port.

Buy Now
Questions 53

If a technician does not assign an IP address to a device, the DHCP server will assign the device a:

Options:

A.

static IP address.

B.

reservation.

C.

dynamic IP address.

D.

MAC address.

Buy Now
Questions 54

Which of the following is a value that can be received from a DHCP server?

Options:

A.

Bootp server address

B.

SMTP server address

C.

WWW server address

D.

VPN server address

Buy Now
Questions 55

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?

Options:

A.

Broadcast storm

B.

TX/RX cables reversed

C.

Mismatched MTU

D.

Incorrect routing table

Buy Now
Questions 56

Which of the following is a terminal emulator used to manage a network device?

Options:

A.

VPN

B.

IDS

C.

PuTTY

D.

IPS

Buy Now
Questions 57

Which of the following do DHCP servers provide to requesting devices on the network? (Select TWO).

Options:

A.

Encryption

B.

Leases

C.

SSID

D.

Channels

E.

Suffixes

F.

VLAN assignments

Buy Now
Questions 58

Which of the following connectors is usable in SFP modules?

Options:

A.

ST

B.

LC

C.

LX

D.

SX

Buy Now
Questions 59

A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?

Options:

A.

Disable the SSID.

B.

Change the broadcast channel.

C.

Lower the signal strength.

D.

Change the antennas.

Buy Now
Questions 60

A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?

Options:

A.

Wrong encryption type

B.

SSID mismatch

C.

Signal bounce

D.

Incorrect channel

Buy Now
Questions 61

A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?

Options:

A.

EAP-PEAP

B.

MAC ACL

C.

EAP-TTLS

D.

MS-CHAPv2

Buy Now
Questions 62

A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?

Options:

A.

Firewalls

B.

VLANs

C.

Channels

D.

Antenna types

Buy Now
Questions 63

When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?

Options:

A.

Denial of service attack

B.

MTU black hole

C.

Switching loop

D.

Defective patch cable

Buy Now
Questions 64

A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?

Options:

A.

96W

B.

168W

C.

240W

D.

369.6W

Buy Now
Questions 65

When a loop occurs, which of the following STP components determines which port to disable?

Options:

A.

Convergence

B.

Root bridge

C.

BPDU guard

D.

MAC address

Buy Now
Questions 66

Which of the following is the BEST network configuration to use if the technician wants to send all outgoing traffic to the external router?

Options:

A.

ACLs

B.

Static routing

C.

Trunking

D.

SNMP strings

Buy Now
Questions 67

At which of the following layers of the OSI model do packets exist?

Options:

A.

Network

B.

Session

C.

Data Link

D.

Transport

Buy Now
Questions 68

Which of the following network protocols would be used to transmit traps across a network to a log server?

Options:

A.

SMTP

B.

PPPoE

C.

POP3

D.

SNMP

Buy Now
Questions 69

Based on the packet capture below, which of the following services is the client requesting?

08:30:54.982378192.168.50.42.8329 > 192.168.50.20.53:

S 32859235:32859235(0) win 8096

08:30:55.001378192.168.50.20.53 > 192.168.50.42.8329:

S 31845637: 31845637(0) ack 32859236 win 8096

08:30:55.027578192.168.50.42.8329 > 192.168.50.51.53:

ack 1 win 8096

Options:

A.

ARP

B.

SMTP

C.

DHCP

D.

DNS

Buy Now
Questions 70

Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?

Options:

A.

250

B.

254

C.

255

D.

256

Buy Now
Questions 71

A number of remote users have reported being unable to securely log on to the company’s network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT?

Options:

A.

Plan to reboot the concentrator as the potential solution

B.

Escalate the problem to management

C.

Continue to speak to users, questioning if changes have been made

D.

Test access to the concentrator to confirm the status

Buy Now
Questions 72

A network where all traffic feeds through a centralized gateway uses which of the following topologies?

Options:

A.

Peer-to-peer

B.

Ring

C.

Bus

D.

Star

Buy Now
Questions 73

At which of the following layers do frames exist? (Select TWO).

Options:

A.

OSI model Data link layer

B.

TCP/IP model Network Interface layer

C.

OSI model Physical layer

D.

OSI model Network layer

E.

TCP/IP model Internet layer

Buy Now
Questions 74

Which of the following protocols are used to provide accurate time to network devices?

Options:

A.

SMTP

B.

FTP

C.

TLS

D.

NTP

Buy Now
Questions 75

The term virtual switch refers to which of the following?

Options:

A.

A switch that has not yet been implemented in the local network

B.

Migrating an entire environment to virtualization

C.

A computer component that controls environmental elements, such as lights and thermometers

D.

A logical, rather than a physical switch device

Buy Now
Questions 76

Which of the following can be configured on a managed network switch to send real time alerts to a technician?

Options:

A.

SSID

B.

SMTP

C.

SNMP

D.

Syslog

Buy Now
Questions 77

At which of the following layers do IP addresses exist?

Options:

A.

TCP/IP model Internet layer

B.

OSI model Data Link layer

C.

TCP/IP model Transport layer

D.

OSI model Physical layer

Buy Now
Questions 78

On which of the following layers of the OSI model does IP operate?

Options:

A.

Session

B.

Transport

C.

Network

D.

Data link

Buy Now
Questions 79

Which of the following is the unit used to transfer information at Layer 2 of the OSI model?

Options:

A.

Packet

B.

Socket

C.

Session

D.

Frame

Buy Now
Questions 80

Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents?

Options:

A.

Logical network diagrams

B.

Physical network diagrams

C.

Wiring schematics

D.

Group security role assignments

Buy Now
Questions 81

A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?

Options:

A.

Escalate by following change procedures

B.

Establish a plan of action to resolve the problem

C.

Document findings, actions, and outcomes

D.

Question the user

Buy Now
Questions 82

Which of the following would be used to run an instance of a Layer 2 device within an application?

Options:

A.

Virtual switch

B.

Virtual router

C.

Virtual PBX

D.

NaaS

Buy Now
Questions 83

Which of the following protocols is used to send time synchronization updates on a given network?

Options:

A.

NTP

B.

POP3

C.

DNS

D.

IMAP

Buy Now
Questions 84

A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?

Options:

A.

Latency

B.

Attenuation

C.

Crosstalk

D.

Frequency hopping

Buy Now
Questions 85

Which of the following DHCP properties defines the size of the pool of available IP addresses?

Options:

A.

Options

B.

Scope

C.

Leases

D.

Reservations

Buy Now
Questions 86

Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:

IP address: 192.168.0.124

Subnet Mask: 255.255.255.128

Default Gateway: 192.168.0.254

Which is MOST likely preventing the user from accessing the Internet?

Options:

A.

Duplicate IP address

B.

Incorrect gateway

C.

Incorrect VLAN

D.

Bad switch port

Buy Now
Questions 87

Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?

Options:

A.

Proxy server

B.

Content filter

C.

Load balancer

D.

VPN concentrator

Buy Now
Questions 88

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

Options:

A.

The network cable connecting the NAS to the network switch is bad.

B.

The network port that the appliance is connected to is assigned to the wrong VLAN.

C.

Port security on the Ethernet switch has disabled the port.

D.

Firewall needs to be updated for the new NAS device.

Buy Now
Questions 89

A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?

Options:

A.

tracert

B.

QoS

C.

ipconfig

D.

MAC filtering

Buy Now
Questions 90

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).

Options:

A.

Cable certifier

B.

Ping command

C.

Punch down tool

D.

Crimper

E.

Toner probe

Buy Now
Questions 91

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Buy Now
Questions 92

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Buy Now
Questions 93

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?

Options:

A.

Honeypot

B.

Butt set

C.

Spyware

D.

Blue jacking

Buy Now
Questions 94

Which of the following wireless security measures, although widely implemented, does not provide strong security?

Options:

A.

IPSec

B.

WPA2

C.

MAC address filtering

D.

802.1x

Buy Now
Questions 95

Which of the following would a network administrator use to scan a network for vulnerabilities?

Options:

A.

ICMP

B.

NMAP

C.

ACL

D.

TCPDUMP

Buy Now
Questions 96

Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?

Options:

A.

TLS 1.2

B.

SNMPv3

C.

WPA2

D.

SMTP

Buy Now
Questions 97

The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:

Options:

A.

patch management

B.

security limitations

C.

documentation

D.

social engineering

Buy Now
Questions 98

Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?

Options:

A.

PKI

B.

Kerberos

C.

TACACS+

D.

RADIUS

Buy Now
Questions 99

Which of the following assists a network administrator in reverse engineering malware and viruses?

Options:

A.

Virtual switches

B.

Virtual machines

C.

VLANs

D.

IDS

Buy Now
Questions 100

A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed?

Options:

A.

Man-in-the-middle

B.

Evil Twin

C.

Packet Sniffing

D.

IV attack

Buy Now
Questions 101

A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

Options:

A.

RADIUS

B.

Single sign on

C.

Multifactor authentication

D.

Two-factor authentication

Buy Now
Questions 102

A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?

Options:

A.

ISAKMP

B.

Port forwarding

C.

Port security

D.

Port mirroring

Buy Now
Questions 103

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

Options:

A.

Packet filtering

B.

Hardware firewalls

C.

Port security

D.

Stateful inspection

Buy Now
Questions 104

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

Options:

A.

PKI

B.

Kerberos

C.

Single sign-on

D.

CHAP

Buy Now
Questions 105

Which of the following is the default authentication method for a Windows client using PPP over a dialup connection?

Options:

A.

TACACS+

B.

WINS

C.

Kerberos

D.

MS-CHAP

Buy Now
Questions 106

Which of the following connector types is MOST commonly used for serial connections?

Options:

A.

MTRJ

B.

RJ-11

C.

RS-232

D.

RJ-45

Buy Now
Questions 107

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

Options:

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Buy Now
Questions 108

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?

Options:

A.

MDF

B.

VPN

C.

RDP

D.

IDF

Buy Now
Questions 109

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Buy Now
Questions 110

Which of the following WAN technology types has the GREATEST latency?

Options:

A.

ISDN

B.

Fiber

C.

Satellite

D.

Cable

Buy Now
Questions 111

Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 112

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?

Options:

A.

Crosstalk

B.

Bad connectors

C.

Wrong DNS

D.

Duplicate IP address

Buy Now
Questions 113

Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO).

Options:

A.

LC

B.

F-connector

C.

DB-9

D.

BNC

E.

RJ-11

F.

SC

Buy Now
Questions 114

Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?

Options:

A.

BNC connection

B.

110 block

C.

Plenum

D.

LC connector

Buy Now
Questions 115

Which of the following cable types is unshielded?

Options:

A.

STP

B.

Twinax

C.

UTP

D.

Coax

Buy Now
Questions 116

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?

Options:

A.

RS-232

B.

Rollover cable

C.

Loopback

D.

Point to point cable

Buy Now
Questions 117

Which of the following is MOST likely used with RG-6 media?

Options:

A.

MTRJ

B.

RJ-11

C.

RJ-45

D.

F-connector

Buy Now
Questions 118

A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?

Options:

A.

Use content filtering

B.

Install and configure IDS

C.

Enable MAC address filtering

D.

Enable RAS on the network firewall

Buy Now
Questions 119

In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?

Options:

A.

MIMO, DSSS

B.

MIMO, OFDM

C.

CSMA, DSSS

D.

CSMA, CDMA

Buy Now
Questions 120

Which of the following would be considered a Demarc extension?

Options:

A.

A patch cable connecting a cable modem with a wireless router

B.

Patch panel wiring

C.

Punch down block wiring

D.

Copper wire connecting the main PSTN point of entry to a wall data outlet

Buy Now
Questions 121

The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?

Options:

A.

Smart jack

B.

MDF

C.

VPN

D.

66 block

Buy Now
Questions 122

Which of the following network topologies describes a network where each node is connected to every other node?

Options:

A.

Bus

B.

Star

C.

Mesh

D.

Ring

Buy Now
Questions 123

A technician can increase the bandwidth of an 802.11n cell by:

Options:

A.

doubling the channel width.

B.

enabling diversity.

C.

disabling MIMO.

D.

adding a second access point.

Buy Now
Questions 124

Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

GBIC

C.

MT-RJ

D.

SC

Buy Now
Status:
Expired
Exam Code: JK0-019
Exam Name: CompTIA E2C Network + Certification Exam
Last Update: Apr 14, 2023
Questions: 828
$64  $159.99
$48  $119.99
$40  $99.99
buy now JK0-019