Which of the following defines a rack located in an office building between the main rack and other office equipment?
Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?
A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail?
Which of the following methods for network performance optimization is used to distribute traffic among similar devices?
Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?
Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?
The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:
A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem?
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A user reports that one of their critical programs no longer functions after a recent router upgrade in the office. A network technician is called in to troubleshoot the issue and documentation shows that the software needs full open connections over ports 558, 981, and 382 in order to function. Which of the following tools could the technician BEST use to troubleshoot this issue?
Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown
Which of the following should Kim do to complete the installation?
Which of the following needs to be configured on a switch to use a packet sniffer?
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?
Logically separating the ports on a switch without physically separating them can be done using which of the following?
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C
Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?
Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?
Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
Which of the following VPN methods is BEST used for connecting a remote office to the main company office?
Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
Which two layers of the OSI model make up the TCP/IP model Network Interface layer?
Which of the following connector types will MOST likely be located on a serial cable?
The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO).
Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?
In order for switching loops to be automatically disabled, which of the following needs to be implemented?
A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?
A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check?
A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?
A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?
A customer has not been using security on a wireless network and has recently received many attacks through this vector. Which of the following would be the MOST secure way to harden this wireless network?
Sandy, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed?
Which of the following network topologies is MOST likely used in remote access VPN?
In which of the following layers of the OSI model does the TCP protocol operate?
Which of the following network appliances will only detect and not prevent malicious network activity?
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?
Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).
Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?
After installing a SOHO wireless router, Joe, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s public interface IP address. Which of the following must Joe implement to assign a different public IP from the router’s public interface IP address to one of the workstations in the office?
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?
Which of the following can use a third party back-end LDAP user database for authentication?
A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?
A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?
A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician thinks the user’s wireless NIC has failed. Which of the following network troubleshooting methodology steps should the technician perform NEXT?
A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?
An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use?
Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
Data arranged into packets would be on which of the following layers of the OSI model?
Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).
Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach’s own country. Which of the following security measures could he use to set up this functionality?
Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).
Which of the following commands can Lisa, a technician, use on a server to display the default router setting?
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?
A network technician is doing a wireless audit and finds an SSID that does not match the company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?
Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem?
A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?
When troubleshooting a connectivity issue, which of the following commands will give Joe, the technician, a list of the host names connected to the network?
The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators?
Which of the following describes a rationale for a network with redundant paths?
An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?
A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?
A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?
An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?
Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
Which of the following security appliances are used to only identify traffic on individual systems?
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is the MOST likely cause?
Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).
The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?
Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?
Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?
Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use?
Which of the following WAN technologies uses four wires for digital and a 66 block?
Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?
Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
Which of the following network topologies describes a network where each node is connected to multiple devices?
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?
Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?
A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs?
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
Which of the following network tools is used to identify running services on host devices?
Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?
Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?
Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?
It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?
An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?
CompTIA Network+ | JK0-023 Questions Answers | JK0-023 Test Prep | CompTIA Network+ certification Questions PDF | JK0-023 Online Exam | JK0-023 Practice Test | JK0-023 PDF | JK0-023 Test Questions | JK0-023 Study Material | JK0-023 Exam Preparation | JK0-023 Valid Dumps | JK0-023 Real Questions | CompTIA Network+ JK0-023 Exam Questions