Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

JK0-023 Questions and Answers

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 Questions and Answers

Question # 6

When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?

A.

Denial of service attack

B.

MTU black hole

C.

Switching loop

D.

Defective patch cable

Full Access
Question # 7

Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?

A.

110

B.

123

C.

143

D.

443

Full Access
Question # 8

Which of the following is used to create a secure connection between a client and a host?

A.

VLAN

B.

Proxy server

C.

IIS server

D.

VPN

Full Access
Question # 9

Which of the following methods limits access to a network based on characteristics of the network card?

A.

IP filtering

B.

MAC filtering

C.

Port filtering

D.

Encryption

Full Access
Question # 10

A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use?

A.

Loopback plug

B.

Crimper tool

C.

Punch down tool

D.

Cable tester

Full Access
Question # 11

Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?

A.

Both T568A and T568B standards are being used.

B.

STP is disabled.

C.

The cable is not a crossover.

D.

The port is not trunked.

Full Access
Question # 12

Which of the following cable types is unshielded?

A.

STP

B.

Twinax

C.

UTP

D.

Coax

Full Access
Question # 13

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Full Access
Question # 14

In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).

A.

VLAN configuration error

B.

Cables too short

C.

Cable crosstalk

D.

Incorrect channel

E.

EMI

F.

Wrong subnet mask

Full Access
Question # 15

A network is having problems with traffic flowing to several critical websites that are used for necessary company work. Which of the following appliances would BEST handle network traffic to increase network performance?

A.

Caching engine

B.

Traffic shaper

C.

Network based firewall

D.

Packet sniffer

Full Access
Question # 16

Which of the following describes a manually entered route?

A.

Static

B.

Dynamic

C.

Multicast

D.

Unicast

Full Access
Question # 17

A technician has been tasked to set-up a managed switch. Which of the following will the technician need to accomplish this task?

A.

IP address

B.

Switch serial number

C.

VLAN tag

D.

Loopback plug

Full Access
Question # 18

A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?

A.

Bad connectors

B.

Cross-talk

C.

EMI / Interference

D.

dB loss

Full Access
Question # 19

A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?

A.

Two-factor authentication

B.

Network access control

C.

Multifactor authentication

D.

Single sign-on

Full Access
Question # 20

When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?

A.

Implement multiple wireless encryption techniques.

B.

Implement PoE on each WAP.

C.

Decrease signal strength.

D.

Increase signal strength.

Full Access
Question # 21

The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).

A.

Network

B.

Session

C.

Transport

D.

Physical

E.

Data link

Full Access
Question # 22

Which of the following TCP/IP model layers does the OSI model Presentation layer map to?

A.

Transport

B.

Internet

C.

Application

D.

Network Interface

Full Access
Question # 23

Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher’s station, a few feet away, to the same hub. The teacher is experiencing no network connectivity. Which of the following is MOST likely the problem?

A.

Cross-talk

B.

Split cables

C.

Distance

D.

EMI

Full Access
Question # 24

A technician wants to separate networks on a switch. Which of the following should be configured to allow this?

A.

VLAN

B.

Trunking

C.

Spanning tree

D.

Traffic filtering

Full Access
Question # 25

Which of the following is a Class A IP address?

A.

10.4.0.1

B.

169.254.0.1

C.

192.168.0.1

D.

254.200.0.1

Full Access
Question # 26

Which of the following network access methods is the MOST secure?

A.

PPPoE

B.

SIP

C.

RSH

D.

IPSec

Full Access
Question # 27

An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

A.

Packet sniffer

B.

Honeypot

C.

Port mirroring

D.

IPS

E.

Port scanner

F.

IDS

Full Access
Question # 28

Which of the following protocols works at the LOWEST layer of the OSI model?

A.

L2TP

B.

PPTP

C.

ISAKMP

D.

IPSec

Full Access
Question # 29

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?

A.

Multi-factor authentication

B.

Two-factor authentication

C.

Biometrics

D.

Single sign-on

Full Access
Question # 30

Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

A.

Packet sniffer

B.

Honeypot

C.

Port mirroring

D.

IPS

E.

Port scanner

F.

IDS

Full Access
Question # 31

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Full Access
Question # 32

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Full Access
Question # 33

Which of the following authentication methods is MOST secure?

A.

NTLM

B.

CHAP

C.

MS-CHAP

D.

Kerberos

Full Access
Question # 34

Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).

A.

23

B.

25

C.

53

D.

80

E.

443

Full Access
Question # 35

Which of the following should the last line of an ACL normally contain?

A.

Explicit allow

B.

Statically routed

C.

Random access

D.

Implicit deny

Full Access
Question # 36

A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

A.

RADIUS

B.

Single sign on

C.

Multifactor authentication

D.

Two-factor authentication

Full Access
Question # 37

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

A.

Content filtering

B.

Port filtering

C.

MAC filtering

D.

IP filtering

Full Access
Question # 38

A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?

A.

Protocol analyzer

B.

ipconfig

C.

nslookup

D.

tracert

Full Access
Question # 39

Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?

A.

traceroute

B.

tracert

C.

ifconfig

D.

ipconfig

Full Access
Question # 40

An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?

A.

Antivirus scanner

B.

IDS

C.

Packet sniffer

D.

Toner probe

Full Access
Question # 41

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Full Access
Question # 42

A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?

A.

Single sign-on

B.

Network access control

C.

PKI authentication

D.

Two-factor authentication

Full Access
Question # 43

A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?

A.

Implement 802.11i on all switches in the network.

B.

Implement port security on all computers in the company.

C.

Implement port security on all switches in the network.

D.

Implement rules on the firewall to block unknown devices.

Full Access
Question # 44

A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?

A.

Man-in-the-middle

B.

DDoS

C.

Evil twin

D.

War driving

Full Access
Question # 45

Which of the following ports is the default telnet port?

A.

20

B.

21

C.

22

D.

23

Full Access
Question # 46

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

A.

Combined DNS and DHCP hosting

B.

Encryption

C.

Content filtering

D.

Fault tolerance

E.

Website caching

Full Access
Question # 47

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Full Access
Question # 48

A bridge handles frames at which of the following layers of the OSI model?

A.

Network

B.

Session

C.

Transport

D.

Data Link

Full Access
Question # 49

Which of the following can function in an unsecure mode?

A.

SNMPv3

B.

SSH

C.

SSL

D.

SCP

Full Access
Question # 50

Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?

A.

ipconfig

B.

ping

C.

sniffer

D.

route

Full Access
Question # 51

Which of the following WAN technologies has the highest latency?

A.

POTS

B.

Cable

C.

Satellite

D.

DSL

Full Access
Question # 52

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?

A.

Port analyzer

B.

Multimeter

C.

Network sniffer

D.

Cable certifier

Full Access
Question # 53

Which of the following tools would Kurt, an administrator, use to identify opens and shorts?

A.

Ohmmeter

B.

Protocol analyzer

C.

Cable tester

D.

Multimeter

Full Access
Question # 54

An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?

A.

Router

B.

Forward proxy

C.

Load balancer

D.

Firewall

Full Access
Question # 55

A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?

A.

WAP placement

B.

TX/RX channel

C.

Signal strength

D.

Transmission power

Full Access
Question # 56

Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use?

A.

Intrusion detection software

B.

PoE

C.

Packet sniffer

D.

Intrusion prevention software

Full Access
Question # 57

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

A.

IPS logs

B.

Application logs

C.

IDS logs

D.

History logs

Full Access
Question # 58

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

A.

Hub

B.

VLAN

C.

Router

D.

Server

Full Access
Question # 59

Which of the following is the MAXIMUM data transmission rate of 802.11a?

A.

8Mbps

B.

11Mbps

C.

54Mbps

D.

107Mbps

Full Access
Question # 60

A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?

A.

Disable the SSID.

B.

Change the broadcast channel.

C.

Lower the signal strength.

D.

Change the antennas.

Full Access
Question # 61

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?

A.

RADIUS

B.

DNS

C.

DHCP

D.

IDS

Full Access
Question # 62

Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router?

A.

FTP and basic Internet traffic

B.

HTTPS and IMAP traffic

C.

DNS and TELNET traffic

D.

VPN and RDP traffic

Full Access
Question # 63

Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

A.

Signature based IPS

B.

Application based IDS

C.

Anomaly based IDS

D.

Application based IPS

Full Access
Question # 64

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?

A.

WPA encryption key selection

B.

Channel selection

C.

Antenna types

D.

Disable SSID

Full Access
Question # 65

When a loop occurs, which of the following STP components determines which port to disable?

A.

Convergence

B.

Root bridge

C.

BPDU guard

D.

MAC address

Full Access
Question # 66

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?

A.

Toner Probe

B.

Punch Down Tool

C.

Protocol Analyzer

D.

Butt Set

Full Access
Question # 67

Which of the following is used to restrict access according to user policies?

A.

Content filter

B.

DHCP server

C.

DNS server

D.

VPN concentrator

Full Access
Question # 68

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Full Access
Question # 69

Which of the following would Sandy, a technician, find in a network map?

A.

QoS standards

B.

MDF/IDFs

C.

System logs

D.

Firewall rules

Full Access
Question # 70

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:

End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

Which of the following should Kim do to complete the installation?

A.

Re-end the provided cable, keeping the wiring the same.

B.

Use the provided cable.

C.

Purchase a crossover cable.

D.

Purchase a straight-through cable.

Full Access
Question # 71

Which of the following is true of a client/server topology?

A.

Virtual servers are used to stream data to other remote servers

B.

Servers are used to connect to centralized clients

C.

Remote clients connect to a centralized server

D.

Remote clients connect to each other via a virtual server

Full Access
Question # 72

Which of the following connectors would be found on a fiber optic cable?

A.

BNC

B.

RJ-11

C.

RS-232

D.

MTRJ

Full Access
Question # 73

Which of the following connectors is used for coaxial copper cable?

A.

BNC

B.

DB-9

C.

RJ-11

D.

ST

Full Access
Question # 74

Which of the following has the HIGHEST data rate speed?

A.

T1

B.

ADSL

C.

SDSL

D.

OC-3

Full Access
Question # 75

The network technician needs to install fiber cabling to connect two buildings less than 984 feet (300 meters) apart. Which of the following fiber types should be installed?

A.

Singlemode

B.

Multimode

C.

Crossover

D.

F-Connector

Full Access
Question # 76

Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Full Access
Question # 77

Which of the following technologies is used to connect public networks using POTS lines?

A.

OC3

B.

OC12

C.

PSTN

D.

Cable

Full Access
Question # 78

Which of the following 802.11 standards transmits the signals the GREATEST distance?

A.

a

B.

b

C.

g

D.

n

Full Access
Question # 79

After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause?

A.

Cable placement

B.

Crosstalk

C.

Bad wiring

D.

Cable length

Full Access
Question # 80

Which of the following WAN technologies has synchronous up/down speeds?

A.

T1

B.

ADSL

C.

Satellite

D.

Cable broadband

Full Access
Question # 81

Which of the following is the FASTEST Ethernet technology?

A.

10GBaseSR

B.

10BaseT

C.

100BaseFX

D.

1000BaseT

Full Access
Question # 82

Which of the following WAN technologies has a MAXIMUM speed of 155.52Mbps?

A.

OC-3

B.

T3

C.

OC-12

D.

E1

Full Access
Question # 83

At which of the following locations does the responsibility of a Telco provider cease?

A.

IDF

B.

CSU

C.

Demarc

D.

MDF

Full Access
Question # 84

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Full Access
Question # 85

Which of the following cable types is required to run through an air duct?

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Full Access
Question # 86

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Full Access
Question # 87

Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?

A.

CSMA/CA

B.

CSMA/CD

C.

Wireless encryption

D.

Wireless bonding

Full Access
Question # 88

Which of the following defines a rack located in an office building between the main rack and other office equipment?

A.

DSU

B.

MDF

C.

CSU

D.

IDF

Full Access
Question # 89

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

A.

Application

B.

Physical

C.

Presentation

D.

Transport

E.

Data Link

F.

Network

Full Access
Question # 90

Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).

A.

Switch

B.

Cable

C.

Repeater

D.

Router

E.

Bridge

F.

Hub

Full Access
Question # 91

Which of the following network optimization methods would be BEST to implement to increase bandwidth for an internal streaming video server?

A.

ISDN

B.

QoS

C.

Upgrade to 10baseT

D.

Buffer overflow

Full Access
Question # 92

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).

A.

172.16.0.255

B.

172.16.0.0

C.

172.16.1.1

D.

172.16.8.0

E.

172.16.256.255

Full Access
Question # 93

Which of the following would Kim, a technician, use in voice over IP communications?

A.

SNTP

B.

SCP

C.

SMTP

D.

SIP

Full Access
Question # 94

Which of the following describes the amount of time it takes for a packet to transmit from one switch to another?

A.

Hop count

B.

Latency

C.

MTU limit

D.

Distance vector

Full Access
Question # 95

Which of the following protocols uses port 3389?

A.

IMAP

B.

DHCP

C.

SSH

D.

RDP

Full Access
Question # 96

At which of the following layers does HTML operate?

A.

Layer 2

B.

Layer 3

C.

Layer 5

D.

Layer 7

Full Access
Question # 97

Which of the following DNS records would allow for a website to have more than one FQDN?

A.

TXT

B.

PTR

C.

MX

D.

CNAME

Full Access
Question # 98

Which of the following TCP/IP model layers combines four OSI model layers?

A.

Application Layer

B.

Internet Layer

C.

Transport Layer

D.

Network Interface Layer

Full Access
Question # 99

Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

A.

Transport services without error recovery

B.

Large data size manageability using segmentation

C.

Secure Kerberos password encryption on data

D.

Delivery through error recovery

E.

Proxy server authentication

Full Access
Question # 100

Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?

A.

Wide Area Network

B.

NAT

C.

Virtual PBX

D.

Virtual LAN

Full Access
Question # 101

Which of the following services would have assigned the IP address 169.254.1.89?

A.

DHCP

B.

APIPA

C.

IDS

D.

DNS

Full Access
Question # 102

Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?

A.

RIP

B.

OSPF

C.

BGP

D.

RIPv2

Full Access
Question # 103

Which of the following solutions will detect and disable a rogue access point?

A.

Port scan

B.

Packet sniffer

C.

IPS

D.

IDS

Full Access
Question # 104

A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?

A.

WPA encryption

B.

MAC filtering

C.

Changing antenna type

D.

Decreasing radio strength

Full Access
Question # 105

A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches?

A.

Turn down the signal strength

B.

Replace the WAP and enable WEP

C.

Change both the SSID and WEP key

D.

Enable WPA2 encryption

Full Access
Question # 106

Which of the following tools will scan a network for hosts and provide information on the installed operating system?

A.

DOCSIS

B.

NMAP

C.

IMAP

D.

BERT

Full Access
Question # 107

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Full Access
Question # 108

Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?

A.

Cable has been looped too many times.

B.

Cable has a twist tie attached too close to the connector.

C.

Cable is too warm.

D.

Cable is run too close to a fluorescent light.

Full Access
Question # 109

Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?

A.

Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.

B.

Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.

C.

Manually adjust the duplex mode on the server’s link.

D.

Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

Full Access
Question # 110

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?

A.

MIMO

B.

AP isolation

C.

Channel bonding

D.

Burst mode

Full Access
Question # 111

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

A.

VLAN

B.

MPLS

C.

VPN

D.

PSTN

Full Access
Question # 112

Which of the following network topologies describes a network where each node is connected to multiple devices?

A.

Mesh

B.

Bus

C.

Star

D.

Ring

Full Access
Question # 113

A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?

A.

Power-cycle the computers and switches to re-establish the network connection.

B.

Re-run the network cabling through the ceiling alongside the lights to prevent interference.

C.

Test the wiring in the network jacks for faults using a cable verifier.

D.

Re-run the network cabling so that they are 12 inches or more away from the electrical lines.

Full Access
Question # 114

Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?

A.

ping

B.

netstat

C.

route

D.

arp

Full Access
Question # 115

Which of the following commands can Lisa, a technician, use on a server to display the default router setting?

A.

ping

B.

nslookup

C.

route

D.

arp

Full Access
Question # 116

A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?

A.

Caching

B.

Asset management

C.

Traffic shaping

D.

High availability

Full Access
Question # 117

An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?

A.

Allow TCP port 3389 outbound

B.

Allow UDP port 3389 inbound

C.

Allow UDP port 3389 outbound

D.

Allow TCP port 3389 inbound

Full Access
Question # 118

Which of the following protocols is used by Windows to securely access a remote computer?

A.

RAS

B.

Telnet

C.

PPP

D.

RDP

Full Access
Question # 119

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO).

A.

Layer 2 switch

B.

MAC address filtering

C.

ACLs

D.

IIS server

E.

Port scanner

F.

Firewall

Full Access
Question # 120

Which of the following is an example of asymmetric encryption?

A.

PKI

B.

SHA1

C.

AES

D.

3DES

Full Access
Question # 121

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

A.

Allow TCP port 23

B.

Allow TCP port 25

C.

Allow TCP port 110

D.

Allow UDP port 25

E.

Allow UDP port 110

Full Access
Question # 122

STP prevents which of the following problems?

A.

Collision domains

B.

Switching loops

C.

Broadcast storms

D.

Routing loops

Full Access
Question # 123

An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?

A.

25

B.

53

C.

110

D.

443

Full Access
Question # 124

A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?

A.

Escalate by following change procedures

B.

Establish a plan of action to resolve the problem

C.

Document findings, actions, and outcomes

D.

Question the user

Full Access
Question # 125

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).

A.

TFTP

B.

SNMP

C.

POP3

D.

IMAP4

E.

SFTP

Full Access
Question # 126

Which of the following records allows for reverse DNS lookups?

A.

AAAA

B.

A

C.

PTR

D.

CNAME

Full Access
Question # 127

Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?

A.

1

B.

5

C.

10

D.

15

Full Access
Question # 128

Which of the following DNS records would be queried to locate a company’s mail server?

A.

A

B.

MX

C.

AAAA

D.

CNAME

Full Access
Question # 129

Which of the following is an invalid MAC address?

A.

AA:CE:58:FD:90:08

B.

44:98:3E:F8:33:23

C.

56:AD:BX:89:55:54

D.

94:9E:FE:EE:8C:DF

Full Access
Question # 130

Which of the following OSI model layers is used for logical addressing?

A.

Physical

B.

Transport

C.

Network

D.

Data link

Full Access
Question # 131

A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT?

A.

Test the theory

B.

Question the user

C.

Document the outcome

D.

Verify functionality

Full Access
Question # 132

Which of the following is a reason to use dynamic DNS?

A.

The host IP address is not listed in the firewall.

B.

The host IP address is assigned by DHCP.

C.

Static routes cannot be used on the host network.

D.

A third-party certificate is being used.

Full Access
Question # 133

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).

A.

Proxy server

B.

Traffic shaping

C.

Caching engines

D.

Load balancing

E.

Quality of service

Full Access
Question # 134

An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?

A.

Run netstat

B.

Run dig

C.

Run nbtstat

D.

Run tracert

Full Access
Question # 135

Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

A.

Protocol analyzer

B.

Toner probe

C.

Cable certifier

D.

Cable stripper

Full Access
Question # 136

Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO).

A.

arp

B.

dig

C.

route

D.

nslookup

E.

netstat

Full Access
Question # 137

An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?

A.

SNMPv3

B.

VTP

C.

CDP

D.

IPSec

Full Access
Question # 138

Sandy, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server is successful. Which of the following software tools is used to check if NetBIOS is enabled?

A.

netstat

B.

arp

C.

nbtstat

D.

nslookup

Full Access
Question # 139

Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?

A.

Multimeter

B.

OTDR

C.

Link state

D.

Protocol analyzer

Full Access
Question # 140

Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?

A.

dig

B.

nbtstat

C.

netstat

D.

ping

Full Access