Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA JK0-019 CompTIA E2C Network + Certification Exam Exam Practice Test

Demo: 124 questions
Total 828 questions

CompTIA E2C Network + Certification Exam Questions and Answers

Question 1

A technician wants to configure multiple switches to support all of the corporate VLANs. Which of the following will allow configuration of the switches and have the information propagate automatically to the other switches?

Options:

A.

FTP server

B.

VTP server

C.

Virtual PBX

D.

NTP server

Question 2

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed?

Options:

A.

The network address translation IP range.

B.

The signal strength of the router.

C.

The DCHP lease time.

D.

The number of allowable MAC addresses.

Question 3

A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem?

Options:

A.

Low PoE wattage

B.

Opposing antenna polarizations

C.

Short distance between antennas

D.

WPA 2 encryption

Question 4

A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?

Options:

A.

VLAN settings

B.

History logs

C.

Patch cable

D.

Port security

Question 5

A technician grabs a network cable and connects two switches together. However, the ports fail to come up as indicated by the link lights. Which of the following is MOST likely the issue?

Options:

A.

Wrong subnet mask on the interfaces

B.

Mismatched MTU size

C.

Straight through instead of cross over cable

D.

SSID mismatch between the switches

Question 6

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?

Options:

A.

Run the dig command on the workstation.

B.

Run the nslookup command on the workstation.

C.

Run the ipconfig command on the workstation.

D.

Run the ifconfig command on the workstation.

Question 7

A computer configured by DHCP has a listed DNS server and gateway. Which of the following allows these settings to be configured?

Options:

A.

Reservations

B.

Leases

C.

Scopes

D.

Options

Question 8

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?

Options:

A.

Configure the main network to Class C

B.

Allow for duplicate IP addresses

C.

Allow the main network to handle DHCP

D.

Create a spanning tree to prevent switching loops

Question 9

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?

Options:

A.

PoE

B.

STP

C.

NAT

D.

VTP

Question 10

Which of the following antenna types has a flat circular radiation pattern?

Options:

A.

Diversity

B.

Yagi

C.

Omni

D.

Patch

Question 11

A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).

Options:

A.

That there is strong encryption enabled and configured on the access point.

B.

The user’s home network has a correctly completed WHOIS entry.

C.

The access point is broadcasting the SSID based upon manufacturer’s standards.

D.

There are no conflicts of channels in use by neighboring wireless networks.

E.

There are redundant internal DNS names set in the access point’s settings.

F.

That the access point’s MAC address is properly set in its configuration settings.

Question 12

The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?

Options:

A.

Incorrect service set identifier

B.

Low signal strength or interference

C.

Incorrect encryption scheme

D.

Incorrect IP address or subnet mask

Question 13

After a power failure, several users are unable to connect to network devices at the remote office. Which of the following is the MOST likely cause of the issue?

Options:

A.

Bad cable

B.

Missing route

C.

Duplicate IP address

D.

Switching loop

Question 14

During a blizzard, a technician decides to work from home but is unable to connect to the company’s network. Which of the following is MOST likely taking place at the office?

Options:

A.

Switching loop

B.

Wrong DNS

C.

Power failure

D.

Duplicate IP address

Question 15

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

Options:

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Question 16

Which of the following can be used to limit wireless network access to a single computer?

Options:

A.

Configure PPP

B.

Packet sniffing

C.

MAC address filtering

D.

Omni-directional antennas

Question 17

A technician has spent most of the day replacing a server running DHCP. Some of the users have begun to call the help desk stating that Internet connection stopped working even after rebooting. Upon investigation, the users’ PCs with issues all have IP addresses that start with 169.254.x.x. The technician completes the replacement and powers on the new DHCP server. Which of the following is the BEST way to provide the PCs with issues a new IP address?

Options:

A.

Statically assign a legitimate IP address, and then set the PCs’ NICs to DHCP

B.

Inform each user to replace 169.254 with 192.168

C.

Wait five minutes until the PC resends a DHCP request

D.

Run netstat on each PC and then reboot into safe mode

Question 18

A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?

Options:

A.

Scope

B.

Reservation

C.

Option

D.

Lease

Question 19

A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended?

Options:

A.

Change the SSID to be unique for each WAP.

B.

Change the antenna direction to be unique for each WAP.

C.

Change the encryption method to be unique for each WAP.

D.

Change the channel to be unique for each WAP.

Question 20

A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch?

Options:

A.

VLAN

B.

PoE

C.

VTP

D.

QoS

Question 21

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?

Options:

A.

Signal strength

B.

SSID mismatch

C.

Channel mismatch

D.

Encryption mismatch

Question 22

A technician is troubleshooting a network camera. The technician restarted the modem and now the camera is no longer available from a mobile device. Which of the following has MOST likely occurred?

Options:

A.

The public IP address of the network has changed.

B.

The camera has received a new firmware update.

C.

The camera’s secure shell has been disabled.

D.

The router has changed the IP of the mobile device.

Question 23

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

Options:

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Question 24

A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?

Access Point 1Access Point 2

802.11g802.11b

Encryption: WPA2Encryption: WEP

Channel: 1Channel: 7

SSID. CompanyWiFiSSID. Visitor

Options:

A.

Change the SSID on Access Point 2 to OPEN.

B.

Disable SSID broadcasting on Access Point 1.

C.

Change the encryption on Access Point 2 to WPA2.

D.

Remove the WEP encryption from Access Point 2.

Question 25

An office has an 802.11a access point. A technician has been asked to identify devices that are compatible with this AP. Which of the following devices is MOST likely compatible?

Options:

A.

An 802.1q SOHO router

B.

An 802.11b tablet computer

C.

An 802.11g laptop

D.

An 802.11n smartphone

Question 26

Drag and drop the fiber cable connection types to the appropriate image.

Options:

Question 27

Which wireless standard works at a MAXIMUM data rate of up to 54Mbps?

Options:

A.

802.11b

B.

802.11g

C.

802.11n

D.

802.1q

Question 28

Which of the following is an example of a CSMA/CD medium?

Options:

A.

WEP

B.

SONET

C.

Token ring

D.

Ethernet

Question 29

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Question 30

A technician is sorting patch cables into four bins labeled coaxial, crossover, straight-through, and fiber. The technician has a cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of the cable start with a green wire. Into which of the following bins should this cable be placed?

Options:

A.

Crossover

B.

Fiber

C.

Straight-through

D.

Coaxial

Question 31

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?

Options:

A.

Crossover

B.

Rollover

C.

Loopback

D.

Straight cable

Question 32

A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT?

Options:

A.

Open shorts

B.

Excessive DB loss

C.

TXRX reversed

D.

Split cables

Question 33

Which of the following types of cables would be used to connect a hub to a patch panel?

Options:

A.

Straight-through cable

B.

Crossover cable

C.

T1 Crossover cable

D.

Rollover cable

Question 34

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

Options:

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Question 35

A SOHO company just installed new 802.11a wireless APs. All company laptops have gigabit LAN ports along with wireless-g cards. Which of the following is the issue with this setup?

Options:

A.

The laptops will have a max wireless speed of 300Mbps

B.

The wired network is likely not backwards compatible with the gigabit LAN ports on the laptops

C.

The wireless system will only function at a slow 11Mbps

D.

The laptops are only capable of functioning on 2.4GHz spectrum

Question 36

A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?

Options:

A.

NIC bonding

B.

Proxy server

C.

Firewall ACLs

D.

VLANs

Question 37

While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?

Options:

A.

Toner

B.

Multimeter

C.

Reflectometer

D.

Cable tester

Question 38

Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?

Options:

A.

BNC connection

B.

110 block

C.

Plenum

D.

LC connector

Question 39

Which of the following types of connectors is used with a CAT6 Ethernet cable?

Options:

A.

RJ-45

B.

BNC

C.

RJ-11

D.

DB-9

Question 40

Which of the following reduces the deployment cost of a wireless LAN?

Options:

A.

WPA

B.

802.1x

C.

MIMO

D.

PoE

Question 41

Which of the following supports faster wireless broadband speeds?

Options:

A.

Satellite

B.

Wi-MAX

C.

ISDN

D.

OC-3

Question 42

Which of the following do 802.11 networks use to handle packet collisions from multiple nodes?

Options:

A.

CSMA/CA

B.

CSU/DSU

C.

Ethernet Tokens

D.

CSMA/CD

Question 43

Which of the following WAN technology types has the GREATEST latency?

Options:

A.

ISDN

B.

Fiber

C.

Satellite

D.

Cable

Question 44

A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Question 45

Which of the following connectors is used on a coaxial cable?

Options:

A.

F

B.

LC

C.

RJ-11

D.

ST

Question 46

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?

Options:

A.

RS-232

B.

Rollover cable

C.

Loopback

D.

Point to point cable

Question 47

An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation?

Options:

A.

Coaxial

B.

Wireless bridge

C.

PoE

D.

Multimode fiber

Question 48

A user needs maximum distance in a wireless connection. Which of the following should be configured to meet this goal?

Options:

A.

802.11a at 54Mbps

B.

802.11b at 1Mbps

C.

802.11g at 11Mbps

D.

802.11n at 130Mbps

Question 49

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?

Options:

A.

Ring

B.

Star

C.

Bus

D.

Mesh

Question 50

A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation?

Options:

A.

UTP

B.

Plenum

C.

Coaxial

D.

STP

Question 51

A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer’s IP addresses:

192.168.2.70

192.168.2.100

192.168.2.125

192.168.2.130

When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do?

Options:

A.

Change the IP of 192.168.2.130 to 192.168.1.128.

B.

Change the IP of 192.168.2.130 to 192.168.2.126.

C.

Change the default gateway of 192.168.2.130 accordingly.

D.

Reconfigure the switch for the right VLAN.

Question 52

Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses?

Options:

A.

255.0.0.0

B.

255.255.0.0

C.

255.255.255.0

D.

255.255.255.254

Question 53

Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?

Options:

A.

Faulty GBIC

B.

Faulty SFP

C.

Cable is a crossover

D.

VLAN mismatch

Question 54

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using?

Options:

A.

Telnet

B.

RADIUS

C.

SSH

D.

SNMP

Question 55

DHCP uses which of the following ports by default?

Options:

A.

21

B.

23

C.

68

D.

443

Question 56

Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?

Options:

A.

DNS

B.

DOS

C.

DHCP

D.

DSL

Question 57

A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT?

Options:

A.

Test the theory

B.

Question the user

C.

Document the outcome

D.

Verify functionality

Question 58

Which of the following is MOST commonly implemented for remote access to UNIX systems?

Options:

A.

SSL

B.

RSH

C.

SSH

D.

RDP

Question 59

A user is unable to access any network resources. The IP configuration of the workstation is as follows:

IP Address: 192.168.10.32

Subnet Mask: 255.255.255.240

Default Gateway: 192.168.10.46

Which of the following would allow the user to connect to network resources?

Options:

A.

Change the default gateway to 192.168.10.1

B.

Change the default gateway to 192.168.10.254

C.

Change the IP address to 192.168.10.31

D.

Change the IP address to 192.168.10.33

Question 60

Which of the following is a link state routing protocol?

Options:

A.

RIPv2

B.

BGP

C.

IS-IS

D.

RIP

Question 61

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?

Options:

A.

Subnet

B.

IANA prefix

C.

EUI-64

D.

Site-local

Question 62

An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection?

Options:

A.

RDP

B.

RTP

C.

RIP

D.

RAS

Question 63

Which of the following IP address/CIDR combinations represent public address space? (Select TWO).

Options:

A.

10.1.1.1/8

B.

172.15.1.1/16

C.

172.16.1.1/16

D.

172.31.1.1/16

E.

193.168.2.1/24

F.

224.0.0.1/32

Question 64

A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used?

Options:

A.

SNMPv3

B.

FTP

C.

TFTP

D.

Telnet

Question 65

An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO).

Options:

A.

TCP 23

B.

TCP 53

C.

TCP 123

D.

UDP 23

E.

UDP 53

F.

UDP 123

Question 66

After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process?

Options:

A.

Implement the solution to the problem.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Implement preventative measures.

Question 67

A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?

Options:

A.

Data link

B.

Network

C.

Session

D.

Physical

Question 68

Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?

Options:

A.

ping

B.

netstat

C.

route

D.

arp

Question 69

Which of the following protocols is used to detect and eliminate switching loops within a network?

Options:

A.

Spanning Tree Protocol

B.

EIGRP

C.

OSPF

D.

Dynamic routing

Question 70

Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem?

Options:

A.

Default gateway

B.

Duplicate IP address

C.

Wrong DNS

D.

Subnet mask

Question 71

An advertised route learned from one protocol over a different protocol is called:

Options:

A.

Co-location

B.

Reallocation

C.

Redundancy

D.

Redistribution

Question 72

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

Options:

A.

Application

B.

Physical

C.

Presentation

D.

Transport

E.

Data Link

F.

Network

Question 73

Which of the following protocols is the BEST choice for retrieving email on multiple devices?

Options:

A.

IMAP4

B.

SMTP

C.

FTP

D.

SNMPv3

Question 74

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used?

Options:

A.

Virtual switch

B.

Virtual server

C.

Virtual desktop

D.

Virtual PBX

Question 75

Which of the following would be used to run an instance of a Layer 2 device within an application?

Options:

A.

Virtual switch

B.

Virtual router

C.

Virtual PBX

D.

NaaS

Question 76

The network administrator has been tasked to create a network segment where resources can be placed for public web access.

Which of the following should be implemented?

Options:

A.

DMZ

B.

Honeynet

C.

PAT

D.

Port security

Question 77

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Question 78

An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use?

Options:

A.

Ping

B.

Nessus

C.

IMAP

D.

Telnet

Question 79

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?

Options:

A.

SSID disable

B.

SNMPv3

C.

WEP

D.

WPA2

Question 80

Which of the following attack types is being used if the originating IP address has been spoofed?

Options:

A.

Ping flood

B.

Trojan

C.

Smurf

D.

Worm

Question 81

The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?

Options:

A.

WAP placement

B.

MAC address filtering

C.

Content filtering

D.

Encryption type and strength

Question 82

A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?

Options:

A.

Stateful inspection

B.

WEP

C.

WPA

D.

Open with EAP

Question 83

Which of the following VPN technologies uses IKE and ISAKMP for key exchange?

Options:

A.

SSL

B.

IPSec

C.

L2TP

D.

PPTP

Question 84

A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed?

Options:

A.

Man-in-the-middle

B.

Evil Twin

C.

Packet Sniffing

D.

IV attack

Question 85

When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?

Options:

A.

Implement multiple wireless encryption techniques.

B.

Implement PoE on each WAP.

C.

Decrease signal strength.

D.

Increase signal strength.

Question 86

Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?

Options:

A.

Evil twin

B.

Honeypot

C.

DMZ

D.

Honeynet

Question 87

Which of the following would be used to place extranet servers in a separate subnet for security purposes?

Options:

A.

VPN

B.

NAT

C.

DMZ

D.

IDS

Question 88

A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

Options:

A.

RADIUS

B.

Single sign on

C.

Multifactor authentication

D.

Two-factor authentication

Question 89

Which of the following tools will scan a network for hosts and provide information on the installed operating system?

Options:

A.

DOCSIS

B.

NMAP

C.

IMAP

D.

BERT

Question 90

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?

Options:

A.

Multi-factor authentication

B.

Two-factor authentication

C.

Biometrics

D.

Single sign-on

Question 91

Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?

Options:

A.

IP filtering

B.

Port filtering

C.

MAC address filtering

D.

DHCP lease

Question 92

A company has a total of two public IP addresses and must allow 150 devices to connect to the Internet at the same time. Which of the following is the BEST option for connectivity?

Options:

A.

VLSM

B.

NAT

C.

CIDR

D.

PAT

Question 93

A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).

Options:

A.

Preventing dictionary attacks on user passwords

B.

Reducing spam from outside email sources

C.

Shielding servers from attacks on internal services

D.

Blocking external probes for vulnerabilities

E.

Directing DNS queries to the primary server

Question 94

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

Question 95

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

Options:

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Question 96

A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request?

Options:

A.

MAC filtering

B.

IP filtering

C.

Port filtering

D.

Content filtering

Question 97

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

Options:

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

Question 98

Which of the following protocols can be implemented to provide encryption during transmission between email gateways?

Options:

A.

TLS

B.

PPTP

C.

SSH

D.

HTTPS

Question 99

A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?

Options:

A.

QoS

B.

Install 802.11n WAP

C.

PoE

D.

Parabolic antenna

Question 100

PKI is a method of user authentication which uses which of the following?

Options:

A.

Various router commands

B.

Access control lists

C.

Certificate services

D.

A RADIUS server

Question 101

Which of the following syslog severity codes indicates an emergency and that the system is unusable?

Options:

A.

0

B.

1

C.

6

D.

7

Question 102

A network technician suspects that there is an issue with the routing table on a Windows-based server. Which of the following commands will enable the technician to validate this hypothesis?

Options:

A.

route print

B.

route

C.

ipconfig

D.

tracert

Question 103

A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

Options:

A.

WINS

B.

QoS

C.

NAT

D.

DHCP

Question 104

Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?

Options:

A.

Multimode fiber

B.

Setting up a new hot site

C.

Central KVM system

D.

Central UPS system

Question 105

When dealing with high bandwidth applications such as VoIP and VTC, which of the following network performance optimization tools should be implemented to ensure BEST performance?

Options:

A.

Fault tolerance

B.

Load balancing

C.

Caching engines

D.

QoS

Question 106

A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method?

Options:

A.

Load balancing

B.

High availability

C.

Caching engines

D.

Quality of Service

Question 107

A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?

Options:

A.

Event viewer

B.

History logs

C.

Network sniffer

D.

System logs

Question 108

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

Options:

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Question 109

A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future?

Options:

A.

Change management

B.

Cable management

C.

Asset management

D.

Setting baselines

Question 110

An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?

Options:

A.

Layer 3 managed switch

B.

VPN concentrator

C.

Load balancer

D.

Content filter

Question 111

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Question 112

A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?

Options:

A.

Traffic shaping

B.

QoS

C.

Caching engines

D.

High availability

Question 113

Which of the following tools allows an administrator to identify a cable?

Options:

A.

Multimeter

B.

Cable stripper

C.

Toner

D.

Punch down tool

Question 114

Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?

Options:

A.

QoS

B.

Fault tolerance

C.

Load balancing

D.

Traffic shaping

Question 115

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

Options:

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Question 116

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Question 117

A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?

Options:

A.

Router firewall

B.

Ping and traceroute

C.

Throughput tester

D.

Protocol analyzer

Question 118

There has been an increase in Help Desk tickets related to web portal user accounts being locked out. Which of the following resources would be used to analyze the issue?

Options:

A.

Router logs

B.

Protocol analyzer

C.

Firewall logs

D.

Application logs

Question 119

A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?

Options:

A.

System log

B.

History log

C.

Network sniffer

D.

Nslookup

Question 120

Which of the following commands can be used on a server to display IP information for a given interface?

Options:

A.

nbtstat

B.

dig

C.

ifconfig

D.

msconfig

Question 121

Which of the following can determine the last time an address lease was renewed on a network device?

Options:

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Question 122

When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?

Options:

A.

ping

B.

nbtstat

C.

arp

D.

msconfig

Question 123

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Question 124

An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed?

Options:

A.

Proxy Server

B.

Load Balancer

C.

VPN Concentrator

D.

Web-Application Firewall

Demo: 124 questions
Total 828 questions