Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: takeit60

Note! Following JK0-019 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-019 CompTIA E2C Network + Certification Exam Questions and Answers

Questions 4

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?

Options:

A.

Honeypot

B.

Butt set

C.

Spyware

D.

Blue jacking

Buy Now
Questions 5

At which of the following locations does the responsibility of a Telco provider cease?

Options:

A.

IDF

B.

CSU

C.

Demarc

D.

MDF

Buy Now
Questions 6

Which of the following is the difference between 802.11b and 802.11g?

Options:

A.

Distance

B.

Frequency

C.

Speed

D.

Transmission power

Buy Now
Questions 7

A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?

Options:

A.

Duplicate IP addresses

B.

Bad GBIC

C.

Wrong gateway

D.

Switching loop

Buy Now
Questions 8

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Buy Now
Questions 9

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?

Options:

A.

Switch the channel

B.

Change frequencies

C.

Channel bonding

D.

Increase the signal

Buy Now
Questions 10

An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?

Options:

A.

SMTP

B.

SSH

C.

DNS

D.

TELNET

Buy Now
Questions 11

Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?

Options:

A.

VLAN tags

B.

SNMP

C.

Packet sniffer

D.

Syslog

Buy Now
Questions 12

A company needs to find a way to best route latency-sensitive traffic appropriately on an already congested network. Which of the following would be BEST suited for this purpose?

Options:

A.

QoS

B.

PPPoE

C.

RADIUS

D.

VPN

Buy Now
Questions 13

A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?

Options:

A.

The router should be listed as 224.0.0.1

B.

The NIC is set to the wrong subnet mask

C.

The route of last resort is missing

D.

Loopback traffic is weighted higher than NIC interface traffic

Buy Now
Questions 14

Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?

Options:

A.

Content filter

B.

VPN concentrator

C.

Load balancer

D.

Proxy server

Buy Now
Questions 15

A company has a server with redundant power supplies. Which of the following is this an example of?

Options:

A.

Traffic shaping

B.

Caching engines

C.

Fault tolerance

D.

Load balancing

Buy Now
Questions 16

Which of the following should be installed to prevent inappropriate websites from being viewed?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Content filter

D.

Proxy server

Buy Now
Questions 17

A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?

Options:

A.

Verify full system functionality

B.

Identify the problem

C.

Establish a theory

D.

Implement the solution

Buy Now
Questions 18

In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).

Options:

A.

VLAN configuration error

B.

Cables too short

C.

Cable crosstalk

D.

Incorrect channel

E.

EMI

F.

Wrong subnet mask

Buy Now
Questions 19

A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?

Options:

A.

Dipole

B.

Parabolic

C.

Directional

D.

Omni-directional

Buy Now
Questions 20

Which of the following network media connectors can use a MAXIMUM of two copper wire pairs?

Options:

A.

F-connector

B.

RJ-11

C.

MTRJ

D.

RJ-45

Buy Now
Questions 21

A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

Options:

A.

WINS

B.

QoS

C.

NAT

D.

DHCP

Buy Now
Questions 22

A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host?

Options:

A.

The network administrator should install and configure a traffic analysis server.

B.

The network administrator should install and configure a DMZ server.

C.

The network administrator should install and configure a syslog server.

D.

The network administrator should install and configure a network sniffer.

Buy Now
Questions 23

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

Options:

A.

Redundancy

B.

Fault tolerance

C.

Unified communications

D.

Uptime requirements

Buy Now
Questions 24

A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?

Options:

A.

nbstat

B.

arp

C.

nslookup

D.

ipconfig

Buy Now
Questions 25

In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods?

Options:

A.

Load balancing

B.

Quality of service

C.

Fault tolerance

D.

Traffic shaping

Buy Now
Questions 26

A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO).

Options:

A.

Toner probe

B.

Cable certifier

C.

Butt set

D.

Crimper

E.

Network analyzer

Buy Now
Questions 27

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?

Options:

A.

Network maps

B.

Traffic analysis

C.

Syslog

D.

ICMP

Buy Now
Questions 28

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

Options:

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Buy Now
Questions 29

A technician is upgrading the wiring in an older office building. The building currently contains some CAT3, CAT5, and CAT6 cables. The technician cannot visually distinguish between the cables because they are all the same color. Which of the following tools would help the technician determine which wires are the CAT3 and CAT5 cables needing to be replaced with CAT6 ones?

Options:

A.

Cable certifier

B.

Toner probe

C.

Cable tester

D.

Crimper

Buy Now
Questions 30

An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario?

Options:

A.

Phone communications

B.

Web site downloads

C.

Streaming video clients

D.

Client bittorrent abilities

Buy Now
Questions 31

A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?

Options:

A.

SSID mismatch

B.

Incorrect WPA key

C.

Signal bounce

D.

Antenna placement

Buy Now
Questions 32

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Options:

A.

NetBIOS name filtering

B.

IP address filtering

C.

MAC address filtering

D.

Computer name filtering

Buy Now
Questions 33

A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user’s office. Which of the following would MOST likely cause them to lose their connection?

Options:

A.

Encryption type

B.

Disabled wireless adapter

C.

SSID mismatch

D.

Interference

Buy Now
Questions 34

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?

Options:

A.

Use two combined Internet/router/wireless devices, one in each house.

B.

Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house.

C.

Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.

D.

Use a single combined Internet/router/wireless device at the guest house.

Buy Now
Questions 35

The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?

Options:

A.

Incorrect service set identifier

B.

Low signal strength or interference

C.

Incorrect encryption scheme

D.

Incorrect IP address or subnet mask

Buy Now
Questions 36

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

Options:

A.

man-in-the-middle attack

B.

rogue access point

C.

evil twin

D.

packet sniffer

Buy Now
Questions 37

A technician has determined that calls placed over a wireless connection are breaking up and the speaker’s voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues?

Options:

A.

Latency

B.

Bad GBIC

C.

Bad SFP

D.

SSID mismatch

Buy Now
Questions 38

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?

Options:

A.

WPA encryption key selection

B.

Channel selection

C.

Antenna types

D.

Disable SSID

Buy Now
Questions 39

If a technician does not assign an IP address to a device, the DHCP server will assign the device a:

Options:

A.

static IP address.

B.

reservation.

C.

dynamic IP address.

D.

MAC address.

Buy Now
Questions 40

Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO).

Options:

A.

Dialup

B.

DSL

C.

SONET

D.

Cable

E.

WiMAX

F.

LTE

Buy Now
Questions 41

Which of the following cable types is unshielded?

Options:

A.

STP

B.

Twinax

C.

UTP

D.

Coax

Buy Now
Questions 42

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Buy Now
Questions 43

The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The installation exceeds the link limitations

B.

The antenna is mounted for vertical polarization

C.

The dBi output of the antenna is too low

D.

The radio is too powerful for the installation

Buy Now
Questions 44

A technician needs to setup an Internet connection for a small office. There are five users that need the ability to use email and do online research. The office manager wants the connection to be always on and be as inexpensive as possible. Which of the following would BEST fit the needs of this office?

Options:

A.

Broadband

B.

T1

C.

Frame Relay

D.

Satellite

Buy Now
Questions 45

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?

Options:

A.

RS-232

B.

Rollover cable

C.

Loopback

D.

Point to point cable

Buy Now
Questions 46

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

Options:

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Buy Now
Questions 47

Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue?

Options:

A.

Wrong default gateway

B.

Wrong DNS

C.

Switching loop

D.

Power failure

Buy Now
Questions 48

A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly?

Options:

A.

nslookup

B.

netstat

C.

traceroute

D.

nbtstat

Buy Now
Questions 49

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

Options:

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Buy Now
Questions 50

A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch?

Options:

A.

VLAN

B.

PoE

C.

VTP

D.

QoS

Buy Now
Questions 51

A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?

Options:

A.

Power-cycle the computers and switches to re-establish the network connection.

B.

Re-run the network cabling through the ceiling alongside the lights to prevent interference.

C.

Test the wiring in the network jacks for faults using a cable verifier.

D.

Re-run the network cabling so that they are 12 inches or more away from the electrical lines.

Buy Now
Questions 52

After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?

Options:

A.

The new user is downloading large files.

B.

The router failed, flooding the network with beacons.

C.

The new user’s IP address is a duplicate.

D.

A switching loop was created.

Buy Now
Questions 53

Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

Options:

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Buy Now
Questions 54

Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network.

Which of the following settings is incorrect on the client?

Options:

A.

The mode is incorrect

B.

SSID Mismatch

C.

Incorrect WEP Key

D.

Channel is set incorrectly

Buy Now
Questions 55

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?

Options:

A.

Configure the main network to Class C

B.

Allow for duplicate IP addresses

C.

Allow the main network to handle DHCP

D.

Create a spanning tree to prevent switching loops

Buy Now
Questions 56

Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?

Options:

A.

STP

B.

Port Mirroring

C.

VLANs

D.

PoE

Buy Now
Questions 57

A technician is assigned the task of connecting two buildings 125 meters apart (410 ft.). Which of the following cable types should the technician consider?

Options:

A.

CAT5e Cable

B.

CAT5 Cable

C.

Plenum

D.

Single mode fiber

Buy Now
Questions 58

Which of the following wireless standards can transmit data up to 540Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 59

Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?

Options:

A.

10GBaseER

B.

10GBaseSR

C.

10GBaseTX

D.

10GBaseT

Buy Now
Questions 60

Which of the following WAN technologies uses an analog phone line to transmit data?

Options:

A.

LTE

B.

DSL

C.

Satellite

D.

Cable

Buy Now
Questions 61

Which of the following wiring distribution is used to connect wiring from equipment inside a company to carrier cabling outside a building?

Options:

A.

66 block

B.

IDF

C.

MDF

D.

Patch panel

Buy Now
Questions 62

PKI is a method of user authentication which uses which of the following?

Options:

A.

Various router commands

B.

Access control lists

C.

Certificate services

D.

A RADIUS server

Buy Now
Questions 63

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

Options:

A.

IPS logs

B.

Application logs

C.

IDS logs

D.

History logs

Buy Now
Questions 64

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

Options:

A.

SNMPv2 access only

B.

TELNET access only

C.

SSH access only

D.

Console access only

Buy Now
Questions 65

A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?

Options:

A.

Behavior based IPS

B.

Signature based IDS

C.

Antivirus software

D.

Access Control Lists

Buy Now
Questions 66

Which of the following should the last line of an ACL normally contain?

Options:

A.

Explicit allow

B.

Statically routed

C.

Random access

D.

Implicit deny

Buy Now
Questions 67

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Buy Now
Questions 68

Which of the following network appliances will only detect and not prevent malicious network activity?

Options:

A.

IDS

B.

Network sniffer

C.

IPS

D.

Firewall

Buy Now
Questions 69

Which of the following VPN technologies uses IKE and ISAKMP for key exchange?

Options:

A.

SSL

B.

IPSec

C.

L2TP

D.

PPTP

Buy Now
Questions 70

Which of the following protocols provides a secure connection between two networks?

Options:

A.

L2TP

B.

IPSec

C.

PPP

D.

PPTP

Buy Now
Questions 71

Which of the following would be the BEST solution for an IDS to monitor known attacks?

Options:

A.

Host-based

B.

Signature-based

C.

Network-based

D.

Behavior-based

Buy Now
Questions 72

A network technician is doing a wireless audit and finds an SSID that does not match the company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?

Options:

A.

AP isolation

B.

DDoS

C.

Evil twin

D.

Rogue AP

Buy Now
Questions 73

Which of the following does Kerberos provide?

Options:

A.

Non-repudiation

B.

Accounting

C.

Exchange

D.

Authentication

Buy Now
Questions 74

On which of the following OSI model layers would a MAC address be used?

Options:

A.

Network

B.

Data Link

C.

Transport

D.

Physical

Buy Now
Questions 75

At which of the following layers do IP addresses exist?

Options:

A.

TCP/IP model Internet layer

B.

OSI model Data Link layer

C.

TCP/IP model Transport layer

D.

OSI model Physical layer

Buy Now
Questions 76

Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO).

Options:

A.

Data Link

B.

Transport

C.

Network

D.

Session

E.

Presentation

Buy Now
Questions 77

Which of the following ports is used by Telnet?

Options:

A.

21

B.

23

C.

80

D.

143

Buy Now
Questions 78

Which of the following exist at layer three of the OSI model? (Select TWO).

Options:

A.

NIC

B.

Switch

C.

Frame

D.

Packet

E.

Router

F.

Cable

Buy Now
Questions 79

A technician has been tasked to set-up a managed switch. Which of the following will the technician need to accomplish this task?

Options:

A.

IP address

B.

Switch serial number

C.

VLAN tag

D.

Loopback plug

Buy Now
Questions 80

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?

Options:

A.

Determine if anything has changed

B.

Once a theory is confirmed determine the next step is to resolve the problem

C.

Implement the solution or escalate as necessary

D.

Question the obvious

Buy Now
Questions 81

A user reports lack of network connectivity on their desktop. Which of the following is the FIRST step of the network troubleshooting methodology that the technician should perform?

Options:

A.

Establish a plan of action to resolve the problem.

B.

Establish a theory of probable cause by questioning the obvious.

C.

Test the theory to determine the cause.

D.

Question the user to determine if anything has changed.

Buy Now
Questions 82

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model?

Options:

A.

Transport

B.

Application

C.

Internet

D.

Network Interface

Buy Now
Questions 83

When a loop occurs, which of the following STP components determines which port to disable?

Options:

A.

Convergence

B.

Root bridge

C.

BPDU guard

D.

MAC address

Buy Now
Questions 84

At which of the following layers of the OSI model does ASCII work?

Options:

A.

Session

B.

Transport

C.

Presentation

D.

Application

Buy Now
Questions 85

Which of the following port numbers needs to be open on a firewall to allow FTP traffic?

Options:

A.

21

B.

22

C.

23

D.

25

Buy Now
Questions 86

Which of the following would be considered a Class C private address?

Options:

A.

10.0.0.125

B.

192.168.50.125

C.

192.169.0.132

D.

255.255.255.0

Buy Now
Questions 87

Which of the following BEST describes the definition of DHCP?

Options:

A.

DHCP is utilized to dynamically lease IP addresses to hosts.

B.

DHCP is utilized to statically lease IP address to hosts.

C.

DHCP is utilized to permanently lease IP address dynamically to hosts.

D.

DHCP is utilized to permanently lease IP address statically to hosts.

Buy Now
Questions 88

Which of the following is a common physical network topology?

Options:

A.

Cross-over

B.

Loopback

C.

Star

D.

Straight

Buy Now
Questions 89

Which of the following network topologies describes a network where each node is connected to multiple devices?

Options:

A.

Mesh

B.

Bus

C.

Star

D.

Ring

Buy Now
Questions 90

A small office needs to connect one new system to their network in a distant office, but does not have the resources to install a new Ethernet wall jack, and does not want to use wireless. Which of the following is a simple, cost effective option for providing connectivity?

Options:

A.

SONET

B.

Multimode fiber

C.

802.11n

D.

Broadband over Power Line

Buy Now
Questions 91

An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity?

Options:

A.

Forwarding proxy

B.

Port address translation

C.

DMZ port security

D.

Application inspection

Buy Now
Questions 92

A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?

Options:

A.

Two-factor authentication

B.

Network access control

C.

Multifactor authentication

D.

Single sign-on

Buy Now
Questions 93

Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?

Options:

A.

Syslog files

B.

Honeypot

C.

Network sniffer

D.

tracert

Buy Now
Questions 94

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

Options:

A.

Packet filtering

B.

Hardware firewalls

C.

Port security

D.

Stateful inspection

Buy Now
Questions 95

Which two layers of the OSI model make up the TCP/IP model Network Interface layer?

Options:

A.

Application and Transport

B.

Transport and Session

C.

Physical and Data Link

D.

Session and Presentation

Buy Now
Questions 96

A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?

Options:

A.

The DHCP lease pool was not large enough

B.

DHCP lease times were set too low

C.

The router is not the only DHCP server

D.

DHCP was not enabled on the replacement router

Buy Now
Questions 97

A network where all traffic feeds through a centralized gateway uses which of the following topologies?

Options:

A.

Peer-to-peer

B.

Ring

C.

Bus

D.

Star

Buy Now
Questions 98

Which of the following is a Class A IP address?

Options:

A.

10.4.0.1

B.

169.254.0.1

C.

192.168.0.1

D.

254.200.0.1

Buy Now
Questions 99

Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses?

Options:

A.

255.0.0.0

B.

255.255.0.0

C.

255.255.255.0

D.

255.255.255.254

Buy Now
Questions 100

Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?

Options:

A.

nslookup

B.

ping

C.

traceroute

D.

route

Buy Now
Questions 101

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

Options:

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Buy Now
Questions 102

A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?

Options:

A.

Event viewer

B.

History logs

C.

Network sniffer

D.

System logs

Buy Now
Questions 103

A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?

Options:

A.

ipconfig

B.

nslookup

C.

dig

D.

tracert

Buy Now
Questions 104

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks?

Options:

A.

RIP

B.

STP

C.

VLAN

D.

MTU

Buy Now
Questions 105

Which of the following STP states indicates an inactivated port due to a loop?

Options:

A.

Disabled

B.

Learning

C.

Blocking

D.

Forwarding

Buy Now
Questions 106

Which of the following OSI model layers is used to order packets which may have arrived out of order?

Options:

A.

Transport

B.

Presentation

C.

Network

D.

Session

Buy Now
Questions 107

Which of the following correctly lists the layers of the OSI model starting at Layer 1?

Options:

A.

Data Link, Physical, Network, Transport, Presentation, Session, Application.

B.

Physical, Data Link, Network, Transport, Presentation, Session, Application.

C.

Physical, Data Link, Transport, Network, Session, Presentation, Application.

D.

Physical, Data Link, Network, Transport, Session, Presentation, Application.

Buy Now
Questions 108

Which of the following features can BEST be used to facilitate authorized remote access to a network?

Options:

A.

VPN concentrator

B.

Proxy server

C.

Content filter

D.

Load balancer

Buy Now
Questions 109

Joe, a technician, is attempting to connect two hubs to add a new segment to his local network. He uses one of his CAT5 patch cables to connect them; however, he is unable to reach the new network segment from his workstation. He can only connect to it from a workstation within that segment. Which of the following is MOST likely the problem?

Options:

A.

One of the hubs is defective.

B.

The new hub is powered down.

C.

The patch cable needs to be a CAT6 patch cable.

D.

The technician used a straight-through cable.

Buy Now
Questions 110

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

Options:

A.

Man-in-the-middle

B.

Social engineering

C.

Phishing

D.

DoS

Buy Now
Questions 111

An administrator would like to provide outside access to the company web server and separate the traffic from the local network. Which of the following would the administrator use to accomplish this?

Options:

A.

Network Address Translation

B.

Stateful Inspection

C.

Port Address Translation

D.

Demilitarized Zone

Buy Now
Questions 112

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

Options:

A.

Allow ANY to 192.168.0.15 port 21

B.

Allow ANY to 192.168.0.15 port 22

C.

Allow ANY to 192.168.0.15 port 80

D.

Allow ANY to ANY port ANY

Buy Now
Questions 113

Which of the following are considered AAA authentication methods? (Select TWO).

Options:

A.

Kerberos

B.

Radius

C.

MS-CHAP

D.

TACACS+

E.

802.1X

Buy Now
Questions 114

Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?

Options:

A.

Host based IPS

B.

Network based firewall

C.

Signature based IDS

D.

Behavior based IPS

Buy Now
Questions 115

Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

Options:

A.

Signature based IPS

B.

Application based IDS

C.

Anomaly based IDS

D.

Application based IPS

Buy Now
Questions 116

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?

Options:

A.

An IP filtering ACL

B.

A MAC filtering ACL

C.

A port filtering ACL

D.

A class matching ACL

Buy Now
Questions 117

Which of the following fiber types is MOST often used indoors?

Options:

A.

Plenum

B.

Modal conditioning

C.

Multimode

D.

Singlemode

Buy Now
Questions 118

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?

Options:

A.

2.0 GHz at 33 Mbps

B.

2.4 GHz at 54 Mbps

C.

2.4 GHz at 128 Mbps

D.

5.0 GHz at 54 Mbps

Buy Now
Questions 119

A technician installs a new CAT6 cable from one end of the office building to another, a total distance of 600 feet (182.88 meters). When a laptop is connected to the cable, it cannot connect to the Internet. Which of the following is MOST likely the cause of this problem?

Options:

A.

Bad connectors

B.

Crosstalk

C.

DB loss

D.

TXRX reversed

Buy Now
Questions 120

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

Options:

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Buy Now
Questions 121

Which of the following wireless standards is the only one capable of operating in any of the 802.11 wireless spectrums?

Options:

A.

A

B.

B

C.

G

D.

N

Buy Now
Questions 122

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?

Options:

A.

Ring

B.

Star

C.

Bus

D.

Mesh

Buy Now
Questions 123

Which of the following is the only standard that can operate at either frequency?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 124

Which of the following is an example of a CSMA/CD medium?

Options:

A.

WEP

B.

SONET

C.

Token ring

D.

Ethernet

Buy Now
Exam Code: JK0-019
Exam Name: CompTIA E2C Network + Certification Exam
Last Update: Apr 14, 2023
Questions: 828