Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: takeit60

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 CompTIA Network+ certification Questions and Answers

Questions 4

Which of the following defines a rack located in an office building between the main rack and other office equipment?

Options:

A.

DSU

B.

MDF

C.

CSU

D.

IDF

Buy Now
Questions 5

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

Options:

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Buy Now
Questions 6

A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail?

Options:

A.

Network flow information

B.

SNMP traps

C.

Debug level syslog

D.

Protocol analyzer

Buy Now
Questions 7

Which of the following STP states indicates an inactivated port due to a loop?

Options:

A.

Disabled

B.

Learning

C.

Blocking

D.

Forwarding

Buy Now
Questions 8

Which of the following methods for network performance optimization is used to distribute traffic among similar devices?

Options:

A.

Fault tolerance

B.

QoS

C.

Proxy server

D.

Load balancing

Buy Now
Questions 9

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?

Options:

A.

Encryption type

B.

SSID

C.

IP address

D.

Channel

Buy Now
Questions 10

Which of the following protocols is used by the ping command?

Options:

A.

SMTP

B.

ICMP

C.

TFTP

D.

ARP

Buy Now
Questions 11

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Proxy server

D.

DNS server

Buy Now
Questions 12

The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:

Options:

A.

CARP.

B.

QoS.

C.

Traffic shaping.

D.

Fault tolerance.

Buy Now
Questions 13

A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem?

Options:

A.

Environmental monitor

B.

Cable tester

C.

TDR

D.

Loopback plug

Buy Now
Questions 14

A firewall that operates at Layer 7 of the OSI model is known as a(n):

Options:

A.

Circuit gateway.

B.

Packet filter.

C.

Application level.

D.

Redundant firewall.

Buy Now
Questions 15

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

Options:

A.

20

B.

21

C.

22

D.

23

Buy Now
Questions 16

Which of the following protocols is MOST commonly associated with VoIP?

Options:

A.

LDAP

B.

HTTPS

C.

SIP

D.

SCP

Buy Now
Questions 17

A user reports that one of their critical programs no longer functions after a recent router upgrade in the office. A network technician is called in to troubleshoot the issue and documentation shows that the software needs full open connections over ports 558, 981, and 382 in order to function. Which of the following tools could the technician BEST use to troubleshoot this issue?

Options:

A.

NET USE

B.

IPCONFIG

C.

TRACEROUTE

D.

TELNET

Buy Now
Questions 18

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:

End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

Which of the following should Kim do to complete the installation?

Options:

A.

Re-end the provided cable, keeping the wiring the same.

B.

Use the provided cable.

C.

Purchase a crossover cable.

D.

Purchase a straight-through cable.

Buy Now
Questions 19

Which of the following needs to be configured on a switch to use a packet sniffer?

Options:

A.

Port trunking

B.

Port mirroring

C.

Tagged VLAN

D.

Untagged VLAN

Buy Now
Questions 20

Which of the following protocols uses port 3389?

Options:

A.

IMAP

B.

DHCP

C.

SSH

D.

RDP

Buy Now
Questions 21

Which of the following is rated for speeds over 800Mbps?

Options:

A.

Coaxial

B.

DB-9

C.

CAT6

D.

CAT5e

Buy Now
Questions 22

Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?

Options:

A.

Wide Area Network

B.

NAT

C.

Virtual PBX

D.

Virtual LAN

Buy Now
Questions 23

Logically separating the ports on a switch without physically separating them can be done using which of the following?

Options:

A.

Routing tables

B.

Hub logic

C.

Spanning tree protocol

D.

VLANs

Buy Now
Questions 24

Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?

Building ABuilding BBuilding C

Channel: 2Channel: 6Channel: 11

Encryption: WPA2Encryption: WPA2Encryption: WPA2

Options:

A.

Encryption set to Open in all Buildings

B.

Encryption set to Open in Building B

C.

Encryption set to WEP in Building B

D.

Channel set to 11 in Building B

Buy Now
Questions 25

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?

Options:

A.

Escalate the problem

B.

Identify potential effects

C.

Test the theory to determine cause

D.

Establish a plan of action to resolve the problem

Buy Now
Questions 26

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

Options:

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Buy Now
Questions 27

Which of the following differentiates a layer 3 switch from a layer 2 switch?

Options:

A.

Routing

B.

Bridging

C.

Switching

D.

Repeating

Buy Now
Questions 28

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?

Options:

A.

WEP

B.

CCMP

C.

TKIP

D.

CHAP

Buy Now
Questions 29

Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?

Options:

A.

nslookup

B.

ping

C.

traceroute

D.

route

Buy Now
Questions 30

Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?

Options:

A.

Content filter

B.

Proxy server

C.

Layer 3 switch

D.

Firewall

Buy Now
Questions 31

Which of the following VPN methods is BEST used for connecting a remote office to the main company office?

Options:

A.

WEP-to-WPA

B.

RDP-to-RAS

C.

Client-to-site

D.

Site-to-site

Buy Now
Questions 32

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

Options:

A.

Switch

B.

Proxy Server

C.

Router

D.

VPN Concentrator

Buy Now
Questions 33

Which two layers of the OSI model make up the TCP/IP model Network Interface layer?

Options:

A.

Application and Transport

B.

Transport and Session

C.

Physical and Data Link

D.

Session and Presentation

Buy Now
Questions 34

Which of the following connector types will MOST likely be located on a serial cable?

Options:

A.

DB-9

B.

LC

C.

ST

D.

BNC

Buy Now
Questions 35

The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO).

Options:

A.

Transport layer

B.

Network layer

C.

Session layer

D.

Physical layer

E.

Presentation layer

F.

Data link layer

Buy Now
Questions 36

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

Options:

A.

Routing loop

B.

MTU black hole

C.

Framing errors

D.

SYN flood

Buy Now
Questions 37

In order for switching loops to be automatically disabled, which of the following needs to be implemented?

Options:

A.

Routing tables

B.

Collision domains

C.

Port mirroring

D.

Spanning-tree protocol

Buy Now
Questions 38

A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?

Options:

A.

VPN

B.

Throughput tester

C.

Firewall

D.

OC3

Buy Now
Questions 39

A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check?

Options:

A.

The arp table of the new customer’s router.

B.

The route table of the next-hop router.

C.

The route table of the new customer’s router.

D.

The arp table of a network user.

Buy Now
Questions 40

A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?

Options:

A.

Adjust the signal strength of the access points with minimal coverage overlap.

B.

Increase the pool in each of the access points to avoid running out of IPs.

C.

Configure each access point to use a different method of encryption than the others.

D.

Reconfigure each of the access points so that they broadcast different SSIDs.

Buy Now
Questions 41

Which of the following would be considered a Class C private address?

Options:

A.

10.0.0.125

B.

192.168.50.125

C.

192.169.0.132

D.

255.255.255.0

Buy Now
Questions 42

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 43

Which of the following uses eight groups of characters for addressing?

Options:

A.

MAC

B.

IPv4

C.

IPv6

D.

DHCP

Buy Now
Questions 44

A customer has not been using security on a wireless network and has recently received many attacks through this vector. Which of the following would be the MOST secure way to harden this wireless network?

Options:

A.

Disable the SSID

B.

WPA encryption

C.

VLAN implementation

D.

WEP encryption

Buy Now
Questions 45

Sandy, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 46

802.11n can operate at which of the following frequencies? (Select TWO).

Options:

A.

2.4Mhz

B.

2.5Mhz

C.

5Mhz

D.

2.4Ghz

E.

2.5Ghz

F.

5Ghz

Buy Now
Questions 47

Which of the following connectors push and twist-on?

Options:

A.

LC

B.

SC

C.

ST

D.

RJ-45

Buy Now
Questions 48

Which of the following network topologies is MOST likely used in remote access VPN?

Options:

A.

Point to Point

B.

Bus

C.

Ring

D.

Mesh

Buy Now
Questions 49

In which of the following layers of the OSI model does the TCP protocol operate?

Options:

A.

Session

B.

Network

C.

Data link

D.

Transport

Buy Now
Questions 50

Which of the following network appliances will only detect and not prevent malicious network activity?

Options:

A.

IDS

B.

Network sniffer

C.

IPS

D.

Firewall

Buy Now
Questions 51

Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?

Options:

A.

IP filtering

B.

Application filtering

C.

MAC filtering

D.

Port filtering

Buy Now
Questions 52

Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

Options:

A.

PKI

B.

TACACS+

C.

CHAP

D.

SSH

Buy Now
Questions 53

Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).

Options:

A.

Cable certifier

B.

Multimeter

C.

Crimper

D.

Punch down tool

E.

Loopback plug

Buy Now
Questions 54

Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?

Options:

A.

traceroute

B.

tracert

C.

ifconfig

D.

ipconfig

Buy Now
Questions 55

After installing a SOHO wireless router, Joe, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s public interface IP address. Which of the following must Joe implement to assign a different public IP from the router’s public interface IP address to one of the workstations in the office?

Options:

A.

NAT

B.

PAT

C.

DMZ

D.

ACL

Buy Now
Questions 56

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?

Options:

A.

An IP filtering ACL

B.

A MAC filtering ACL

C.

A port filtering ACL

D.

A class matching ACL

Buy Now
Questions 57

The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?

Options:

A.

WAP placement

B.

MAC address filtering

C.

Content filtering

D.

Encryption type and strength

Buy Now
Questions 58

Which of the following can use a third party back-end LDAP user database for authentication?

Options:

A.

ISAKMP

B.

TACACS+

C.

PKI

D.

CHAP

Buy Now
Questions 59

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

Options:

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Buy Now
Questions 60

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?

Options:

A.

Content filter

B.

Packet filter

C.

IPS

D.

IDS

Buy Now
Questions 61

A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician thinks the user’s wireless NIC has failed. Which of the following network troubleshooting methodology steps should the technician perform NEXT?

Options:

A.

Test the theory to determine the cause.

B.

Implement the solution or escalate as necessary.

C.

Establish a plan of action to resolve the problem.

D.

Re-establish new theory or escalate.

Buy Now
Questions 62

DHCP uses which of the following ports by default?

Options:

A.

21

B.

23

C.

68

D.

443

Buy Now
Questions 63

Which of the following is the common port used for IMAP?

Options:

A.

25

B.

53

C.

143

D.

443

Buy Now
Questions 64

A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?

Options:

A.

Escalate by following change procedures

B.

Establish a plan of action to resolve the problem

C.

Document findings, actions, and outcomes

D.

Question the user

Buy Now
Questions 65

An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use?

Options:

A.

Ping

B.

Nessus

C.

IMAP

D.

Telnet

Buy Now
Questions 66

Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?

Options:

A.

Intrusion prevention software

B.

Packet sniffer

C.

Intrusion detection software

D.

Port scanner

Buy Now
Questions 67

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

Options:

A.

SNMPv2 access only

B.

TELNET access only

C.

SSH access only

D.

Console access only

Buy Now
Questions 68

Data arranged into packets would be on which of the following layers of the OSI model?

Options:

A.

Datagram

B.

Transport

C.

Presentation

D.

Network

Buy Now
Questions 69

Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

Options:

A.

Packet sniffer

B.

Honeypot

C.

Port mirroring

D.

IPS

E.

Port scanner

F.

IDS

Buy Now
Questions 70

Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach’s own country. Which of the following security measures could he use to set up this functionality?

Options:

A.

MAC filtering

B.

Port filtering

C.

IP filtering

D.

TLS

Buy Now
Questions 71

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

Options:

A.

Application

B.

Physical

C.

Presentation

D.

Transport

E.

Data Link

F.

Network

Buy Now
Questions 72

Which of the following commands can Lisa, a technician, use on a server to display the default router setting?

Options:

A.

ping

B.

nslookup

C.

route

D.

arp

Buy Now
Questions 73

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Buy Now
Questions 74

A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?

Options:

A.

IS-IS

B.

BGP

C.

OSPF

D.

RIP

Buy Now
Questions 75

A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?

Options:

A.

Wire tap

B.

Network sniffer

C.

Load balancing appliance

D.

NIPS

Buy Now
Questions 76

A network technician is doing a wireless audit and finds an SSID that does not match the company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?

Options:

A.

AP isolation

B.

DDoS

C.

Evil twin

D.

Rogue AP

Buy Now
Questions 77

Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem?

Options:

A.

The channels are overlapping with other wireless networks and should be changed.

B.

The SSIDs are incompatible and should be renamed.

C.

The users have incompatible wireless network cards and should upgrade.

D.

The default idle period for logoff is too short and should be changed to a longer limit.

Buy Now
Questions 78

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?

Options:

A.

Configure the main network to Class C

B.

Allow for duplicate IP addresses

C.

Allow the main network to handle DHCP

D.

Create a spanning tree to prevent switching loops

Buy Now
Questions 79

When troubleshooting a connectivity issue, which of the following commands will give Joe, the technician, a list of the host names connected to the network?

Options:

A.

ping

B.

nbstat

C.

arp

D.

msconfig

Buy Now
Questions 80

The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators?

Options:

A.

Asset management

B.

System baselines

C.

System logging

D.

Change management

Buy Now
Questions 81

Which of the following describes a rationale for a network with redundant paths?

Options:

A.

VPN compatibility

B.

Unified communications implementation

C.

High availability requirement

D.

QoS

Buy Now
Questions 82

An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?

Options:

A.

Run netstat

B.

Run dig

C.

Run nbtstat

D.

Run tracert

Buy Now
Questions 83

A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?

Options:

A.

arp

B.

ipconfig

C.

tracert

D.

route

Buy Now
Questions 84

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Buy Now
Questions 85

Which of the following network access methods is the MOST secure?

Options:

A.

PPPoE

B.

SIP

C.

RSH

D.

IPSec

Buy Now
Questions 86

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

Options:

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

Buy Now
Questions 87

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

Options:

A.

Decreasing radio strength

B.

MAC filtering

C.

WEP encryption

D.

SSID broadcast disable

Buy Now
Questions 88

Which of the following security appliances are used to only identify traffic on individual systems?

Options:

A.

Host based IPS

B.

Application based IPS

C.

Network based IDS

D.

Host based IDS

Buy Now
Questions 89

Which of the following should the last line of an ACL normally contain?

Options:

A.

Explicit allow

B.

Statically routed

C.

Random access

D.

Implicit deny

Buy Now
Questions 90

Which of the following does Kerberos provide?

Options:

A.

Non-repudiation

B.

Accounting

C.

Exchange

D.

Authentication

Buy Now
Questions 91

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

Options:

A.

Content filtering

B.

Port filtering

C.

MAC filtering

D.

IP filtering

Buy Now
Questions 92

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Buy Now
Questions 93

Honeypots and honeynets are different in which of the following ways?

Options:

A.

Honeynets are managed collections of honeypots.

B.

Honeypots only test software security, not hardware.

C.

Honeynets require specialized hardware to implement.

D.

Honeypots are usually servers and honeynets are routers and switches.

Buy Now
Questions 94

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Buy Now
Questions 95

Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is the MOST likely cause?

Options:

A.

Encryption strength

B.

SSID mismatch

C.

Interference

D.

Incompatible NIC

Buy Now
Questions 96

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).

Options:

A.

Cable certifier

B.

Ping command

C.

Punch down tool

D.

Crimper

E.

Toner probe

Buy Now
Questions 97

The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?

Options:

A.

The installation exceeds the link limitations

B.

The antenna is mounted for vertical polarization

C.

The dBi output of the antenna is too low

D.

The radio is too powerful for the installation

Buy Now
Questions 98

Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?

Options:

A.

netstat

B.

ipconfig

C.

ping

D.

traceroute

Buy Now
Questions 99

Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?

Options:

A.

Cable has been looped too many times.

B.

Cable has a twist tie attached too close to the connector.

C.

Cable is too warm.

D.

Cable is run too close to a fluorescent light.

Buy Now
Questions 100

Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use?

Options:

A.

CAT5e

B.

CAT6

C.

Coaxial

D.

Multimode fiber

Buy Now
Questions 101

Which of the following WAN technologies uses four wires for digital and a 66 block?

Options:

A.

Cable

B.

ATM

C.

T3

D.

POTS

Buy Now
Questions 102

Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?

Options:

A.

Router

B.

MDF

C.

IDF

D.

Demarc

Buy Now
Questions 103

Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

Options:

A.

Install two CAT6 cables with a repeater.

B.

Install a 500 foot (152 meter) CAT5 cable.

C.

Install a 500 foot (152 meter) CAT5e cable.

D.

Install three CAT6 cables with a repeater.

Buy Now
Questions 104

Which of the following network topologies describes a network where each node is connected to multiple devices?

Options:

A.

Mesh

B.

Bus

C.

Star

D.

Ring

Buy Now
Questions 105

The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?

Options:

A.

Smart jack

B.

MDF

C.

VPN

D.

66 block

Buy Now
Questions 106

Which of the following is MOST likely used with RG-6 media?

Options:

A.

MTRJ

B.

RJ-11

C.

RJ-45

D.

F-connector

Buy Now
Questions 107

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

Options:

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Buy Now
Questions 108

CAT6 Ethernet cabling has a rated maximum transmission capability of:

Options:

A.

10Mbps

B.

100Mbps

C.

20,000Mbps

D.

10,000Mbps

Buy Now
Questions 109

Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 110

Which of the following has the HIGHEST data rate speed?

Options:

A.

T1

B.

ADSL

C.

SDSL

D.

OC-3

Buy Now
Questions 111

A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs?

Options:

A.

Mirroring

B.

Trunking

C.

Authenticating

D.

Bonding

Buy Now
Questions 112

Which of the following defines access for a network?

Options:

A.

ACL

B.

RDP

C.

RAS

D.

ARP

Buy Now
Questions 113

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

Options:

A.

The network cable connecting the NAS to the network switch is bad.

B.

The network port that the appliance is connected to is assigned to the wrong VLAN.

C.

Port security on the Ethernet switch has disabled the port.

D.

Firewall needs to be updated for the new NAS device.

Buy Now
Questions 114

Which of the following network tools is used to identify running services on host devices?

Options:

A.

IDS

B.

IPS

C.

Firewall

D.

NMAP

Buy Now
Questions 115

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Options:

A.

SYN flood

B.

Teardrop

C.

Smurf

D.

FTP bounce

Buy Now
Questions 116

Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?

Options:

A.

Multimode fiber

B.

Setting up a new hot site

C.

Central KVM system

D.

Central UPS system

Buy Now
Questions 117

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

Options:

A.

Hub

B.

VLAN

C.

Router

D.

Server

Buy Now
Questions 118

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?

Options:

A.

Load balancing

B.

Traffic policing

C.

Caching engines

D.

Traffic shaping

Buy Now
Questions 119

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?

Options:

A.

Port analyzer

B.

Multimeter

C.

Network sniffer

D.

Cable certifier

Buy Now
Questions 120

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

Options:

A.

Asset management

B.

Baselines

C.

Network maps

D.

Change management

Buy Now
Exam Code: JK0-023
Exam Name: CompTIA Network+ certification
Last Update: Apr 14, 2023
Questions: 1112