Summer Sale 60% Special Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best60

CompTIA JK0-019 CompTIA E2C Network + Certification Exam Exam Practice Test

Page: 1 / 83
Total 828 questions

CompTIA E2C Network + Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$48  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $104.99
Question 1

A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?

Options:

A.

Environmental monitor

B.

Multimeter

C.

Toner probe

D.

Protocol analyzer

Question 2

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?

Options:

A.

Broadcast storm

B.

TX/RX cables reversed

C.

Mismatched MTU

D.

Incorrect routing table

Question 3

A technician is troubleshooting a wireless network that was setup previously. The network is a hybrid of 802.11g and 802.11n WAPs. Users are not able to view or connect to the 802.11n WAPs. Which of the following is MOST likely the cause?

Options:

A.

The 802.11g WAPs are not setup for backwards compatibility.

B.

The 802.11n WAPs are using a 2.4 GHz frequency channel.

C.

The 802.11n WAPs are using a 5 GHz frequency channel.

D.

The 802.11g WAPs all have disabled SSID broadcast.

Question 4

A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?

Options:

A.

96W

B.

168W

C.

240W

D.

369.6W

Question 5

A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?

Options:

A.

VLAN settings

B.

History logs

C.

Patch cable

D.

Port security

Question 6

When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?

Options:

A.

Denial of service attack

B.

MTU black hole

C.

Switching loop

D.

Defective patch cable

Question 7

A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT?

Options:

A.

Ask the users for more information, such as which applications were not functioning.

B.

Power-cycle the switch that the users share to clear out cached DNS records.

C.

Escalate the issue to the network administrator to have their domain credentials reset.

D.

Close and document the service call, as there was no actual issue affecting the users.

Question 8

Which of the following can be used to limit wireless network access to a single computer?

Options:

A.

Configure PPP

B.

Packet sniffing

C.

MAC address filtering

D.

Omni-directional antennas

Question 9

Which of the following standards can operate at either 20MHz or 40MHz channel spacing?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 10

A user is on a network with two upstream connections to the Internet and is experiencing intermittent issues while connecting to websites. Some websites are available but others are not. Which of the following is the MOST likely cause of the condition?

Options:

A.

Incorrect VLAN assignment

B.

Bad or missing routes

C.

Switching loop

D.

Wrong subnet mask

Question 11

A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?

Options:

A.

SSID mismatch

B.

Incorrect WPA key

C.

Signal bounce

D.

Antenna placement

Question 12

Workstations are unable to access the internet after a recent power outage. Configure the appropriate devices to ensure All workstations have internet connectivity.

Options:

Question 13

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

Options:

A.

man-in-the-middle attack

B.

rogue access point

C.

evil twin

D.

packet sniffer

Question 14

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?

Options:

A.

Run the dig command on the workstation.

B.

Run the nslookup command on the workstation.

C.

Run the ipconfig command on the workstation.

D.

Run the ifconfig command on the workstation.

Question 15

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

Options:

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Question 16

GigSwitch1 is currently configured with a speed of 100 and Duplex is set to Auto on all interfaces. Interface 2 will be connected to GigSwitch2 which is used for all departments. Interface 1 will be used for HR traffic only.

GigSwitch1 needs to be configured with the following parameters:

Configure the necessary protocol to prevent switching loops

Configure GigSwitch1 with a /24 IP address for management

Traffic across Interface 1 needs to be forced to accept and receive up to 100Mbps data at the same time

Traffic across Interface 2 needs to be forced to use Gigabit speeds and maximum performance

Drag and drop the appropriate configurations to their corresponding requirements. All placeholders must be filled. Not all configurations will be used.

Options:

Question 17

A technician wants to configure multiple switches to support all of the corporate VLANs. Which of the following will allow configuration of the switches and have the information propagate automatically to the other switches?

Options:

A.

FTP server

B.

VTP server

C.

Virtual PBX

D.

NTP server

Question 18

A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions?

Options:

A.

A VPN concentrator

B.

A switch

C.

A router

D.

A firewall

Question 19

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).

Options:

A.

Proxy server

B.

Traffic shaping

C.

Caching engines

D.

Load balancing

E.

Quality of service

Question 20

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?

Options:

A.

WPA encryption key selection

B.

Channel selection

C.

Antenna types

D.

Disable SSID

Question 21

A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?

Options:

A.

The proxy server is set incorrectly.

B.

The Ethernet cable is pinched.

C.

The network gateway is set incorrectly.

D.

The IP address is set incorrectly.

Question 22

A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?

Access Point 1Access Point 2

802.11g802.11b

Encryption: WPA2Encryption: WEP

Channel: 1Channel: 7

SSID. CompanyWiFiSSID. Visitor

Options:

A.

Change the SSID on Access Point 2 to OPEN.

B.

Disable SSID broadcasting on Access Point 1.

C.

Change the encryption on Access Point 2 to WPA2.

D.

Remove the WEP encryption from Access Point 2.

Question 23

A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?

Options:

A.

Duplicate IP addresses

B.

Bad GBIC

C.

Wrong gateway

D.

Switching loop

Question 24

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

Options:

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

Question 25

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?

Options:

A.

PoE

B.

STP

C.

NAT

D.

VTP

Question 26

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

Options:

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Question 27

Drag and drop the fiber cable connection types to the appropriate image.

Options:

Question 28

A consultant has been hired to wire a simple small office of ten computers to a layer 2 Ethernet 100BaseT switch. Which of the following cabling will be needed for the installation?

Options:

A.

Multimode fiber

B.

RG-59 coaxial

C.

CAT6a

D.

CAT3

Question 29

A technician is tasked with rewiring a CAT5e SOHO network with 10 existing computers. The users are currently running at 100 Mbps and would like to be upgraded to 1000 Mbps. Which of the following should the technician do FIRST?

Options:

A.

Upgrade the existing computers

B.

Purchase a new 802.11ac access point and install.

C.

Install CAT6 wiring for the SOHO network

D.

Verify the network cards can support 1Gbps

Question 30

A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?

Options:

A.

Use content filtering

B.

Install and configure IDS

C.

Enable MAC address filtering

D.

Enable RAS on the network firewall

Question 31

Which of the following network topologies is MOST likely used in remote access VPN?

Options:

A.

Point to Point

B.

Bus

C.

Ring

D.

Mesh

Question 32

Which of the following wiring distribution is used to connect wiring from equipment inside a company to carrier cabling outside a building?

Options:

A.

66 block

B.

IDF

C.

MDF

D.

Patch panel

Question 33

A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?

Options:

A.

dB loss

B.

Distance

C.

Incorrect connector type

D.

EMI

E.

Crosstalk

Question 34

Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?

Options:

A.

10GBaseER

B.

10GBaseSR

C.

10GBaseTX

D.

10GBaseT

Question 35

An 802.11a wireless network is functioning at which of the following frequencies?

Options:

A.

1.0 GHz

B.

1.5 GHz

C.

2.4 GHz

D.

5.0 GHz

Question 36

Which of the following is used to allow multiple sources on a single optical cable?

Options:

A.

HSPA+

B.

MIMO

C.

DWDM

D.

SONET

Question 37

A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT?

Options:

A.

Open shorts

B.

Excessive DB loss

C.

TXRX reversed

D.

Split cables

Question 38

Which of the following technologies allows multiple staff members to connect back to a centralized office?

Options:

A.

Peer to Peer

B.

VPN

C.

PKI

D.

VLAN

Question 39

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?

Options:

A.

Attenuation

B.

Latency

C.

Crosstalk

D.

External interference

Question 40

Which of the following fiber types is MOST often used indoors?

Options:

A.

Plenum

B.

Modal conditioning

C.

Multimode

D.

Singlemode

Question 41

Which of the following is a requirement for bridging with 802.11a?

Options:

A.

WPA encryption

B.

Governmental licenses

C.

High gain yagi antennas

D.

Clear line of sight

Question 42

Which of the following wireless standards has a maximum rate of less than 50 Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 43

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?

Options:

A.

Configure Wi-Fi Multimedia support

B.

Use only 20 MHz channel bandwidth

C.

Enable band steering to use 802.11n

D.

Configure Quality of Service

Question 44

A VoIP system running over a wireless network link is continually being reported as choppy. Which of the following is the cause of this issue?

Options:

A.

Frequency

B.

Latency

C.

Interference

D.

Encryption type

Question 45

Which of the following is MOST commonly used with a fiber-optic network backbone?

Options:

A.

100BaseFX

B.

100BaseT

C.

100BaseTX

D.

1000BaseCX

Question 46

Which of the following do 802.11 networks use to handle packet collisions from multiple nodes?

Options:

A.

CSMA/CA

B.

CSU/DSU

C.

Ethernet Tokens

D.

CSMA/CD

Question 47

Which of the following WAN technologies has the highest latency?

Options:

A.

POTS

B.

Cable

C.

Satellite

D.

DSL

Question 48

Which of the following cable types is required to run through an air duct?

Options:

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Question 49

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

Options:

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Question 50

Which of the following 802.11 standards can operate at both 2.4Ghz and 5.0Ghz?

Options:

A.

a

B.

b

C.

g

D.

n

Question 51

Which of the following is a public class C IP address?

Options:

A.

4.2.2.2

B.

194.178.12.54

C.

175.35.46.60

D.

192.168.1.34

Question 52

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model?

Options:

A.

Transport

B.

Application

C.

Internet

D.

Network Interface

Question 53

Which of the following is an example of a Class C address?

Options:

A.

10.19.0.79

B.

127.34.8.197

C.

176.96.1.222

D.

192.168.1.105

Question 54

Multiple servers’ IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations?

Options:

A.

The administrator should create exclusions for the workstations IP addresses.

B.

The administrator should change the servers to utilize DHCP to obtain IP addresses.

C.

The administrator should change the workstations to utilize static IP addresses.

D.

The administrator should create exclusions for the servers IP addresses.

Question 55

Which of the following can be configured on a managed network switch to send real time alerts to a technician?

Options:

A.

SSID

B.

SMTP

C.

SNMP

D.

Syslog

Question 56

Which of the following is an advantage of dynamic routing?

Options:

A.

It can reroute connectivity in the event of failure.

B.

It is the simplest form of routing.

C.

The routes do not change.

D.

The setup and configuration are done manually.

Question 57

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

Options:

A.

Combined DNS and DHCP hosting

B.

Encryption

C.

Content filtering

D.

Fault tolerance

E.

Website caching

Question 58

A MAC address is a part of which of the following OSI model layers?

Options:

A.

Network

B.

Data Link

C.

Physical

D.

Transport

Question 59

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

Options:

A.

VLAN

B.

MPLS

C.

VPN

D.

PSTN

Question 60

Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of the following could be the cause of this failure?

Options:

A.

Duplicate IP address

B.

Incorrect subnet mask

C.

Incorrect gateway

D.

Wrong DNS

Question 61

A technician has installed a group of layer 2 switches with multiple VLANs. The VLANs cannot talk to each other. Which of the following network devices could correct this problem? (Select TWO).

Options:

A.

Hub

B.

DNS server

C.

DHCP server

D.

Layer 3 switch

E.

Router

Question 62

Which of the following protocols is the BEST choice for retrieving email on multiple devices?

Options:

A.

IMAP4

B.

SMTP

C.

FTP

D.

SNMPv3

Question 63

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?

Options:

A.

Layer 1

B.

Layer 3

C.

Layer 5

D.

Layer 7

Question 64

192.168.0.7/8 notation denotes which of the following IPv4 subnet masks?

Options:

A.

255.0.0.0

B.

255.255.0.0

C.

255.255.255.0

D.

255.255.255.255

Question 65

Which of the following TCP/IP model layers does the OSI model Data Link layer map to?

Options:

A.

Application

B.

Transport

C.

Internet

D.

Network Interface

Question 66

A company pays a third-party vendor a monthly fee to connect to offsite servers and desktops. Users connect to the desktops via RDP, and administrators connect to the servers via VPN. Servers and desktops are hardware-based. Which of the following is the third-party providing?

Options:

A.

Virtual desktops

B.

Virtual servers

C.

NaaS

D.

SaaS

Question 67

Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF?

Options:

A.

Unicast MAC address.

B.

Invalid MAC address.

C.

Multicast MAC address.

D.

Broadcast MAC address.

Question 68

Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem?

Options:

A.

Default gateway

B.

Duplicate IP address

C.

Wrong DNS

D.

Subnet mask

Question 69

Standards such as JPEG and ASCII operate at which of the following OSI model layers?

Options:

A.

Presentation

B.

Data link

C.

Session

D.

Application

Question 70

At which layer of the OSI and TCP/IP model would HTTP and FTP be found?

Options:

A.

Application

B.

Network

C.

Session

D.

Data Link

Question 71

Which of the following is a Class A IP address?

Options:

A.

10.4.0.1

B.

169.254.0.1

C.

192.168.0.1

D.

254.200.0.1

Question 72

Which of the following is a link state routing protocol?

Options:

A.

RIPv2

B.

BGP

C.

IS-IS

D.

RIP

Question 73

Which of the following protocols is used to transfer files over the Internet?

Options:

A.

SNMP

B.

NTP

C.

FTP

D.

SIP

Question 74

The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).

Options:

A.

Network

B.

Session

C.

Transport

D.

Physical

E.

Data link

Question 75

Which of the following provides secure access to a network device?

Options:

A.

SNMPv2

B.

FTP

C.

RSH

D.

SSH

Question 76

Which of the following are authentication methods that can use AAA authentication? (Select TWO).

Options:

A.

Kerberos

B.

PKI

C.

TKIP/AES

D.

MS-CHAP

E.

RADIUS

F.

TACACS+

Question 77

Which of the following remote access types requires a certificate for connectivity?

Options:

A.

SSH

B.

PPP

C.

HTTPS

D.

WEP

Question 78

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Question 79

An attack used to find unencrypted information in network traffic is called:

Options:

A.

WEP cracking

B.

packet sniffing

C.

ping sweep

D.

social engineering

Question 80

A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?

Options:

A.

Honeynet

B.

Signature based IPS

C.

Behavior based IPS

D.

Host based IPS

Question 81

A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?

Options:

A.

Implicit deny

B.

HTTP transports over UDP

C.

Website is down

D.

DNS server failure

Question 82

A network technician is configuring a new firewall for placement into an existing network infrastructure. The existing network is connected to the Internet by a broadband connection. Which of the following represents the BEST location for the new firewall?

Options:

A.

The firewall should be placed between the Internet connection and the local network.

B.

The firewall should be placed inside the local network.

C.

The firewall should be placed between the broadband connection and the Internet.

D.

The firewall should be placed in the Internet cloud.

Question 83

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

Options:

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Question 84

Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?

Options:

A.

Presentation

B.

Application

C.

Physical

D.

Session

Question 85

Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network?

Options:

A.

Zone filtering

B.

Signature identification

C.

Port identification

D.

Port scanner

Question 86

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

Options:

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Question 87

Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?

Options:

A.

Port security

B.

IDS

C.

Firewall rules

D.

Switch VLAN assignments

Question 88

Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop?

Options:

A.

Enable the host-based firewall on each of the laptops

B.

Use a VPN after connecting to the coffee shop wireless

C.

Edit the SSID connection information and change 'open' to 'shared'

D.

Connect to the open SSID then switch on WPA2 encryption

Question 89

Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?

Options:

A.

Network based IDS

B.

Firewall

C.

Network based IPS

D.

Honeynet

Question 90

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

Question 91

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?

Options:

A.

SSID disable

B.

SNMPv3

C.

WEP

D.

WPA2

Question 92

An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

Options:

A.

Baseline analyzer

B.

Ping

C.

Protocol analyzer

D.

Nessus

Question 93

A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?

Options:

A.

Change management

B.

Asset management

C.

Network sniffer

D.

System logs

Question 94

An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity?

Options:

A.

Forwarding proxy

B.

Port address translation

C.

DMZ port security

D.

Application inspection

Question 95

A network technician has a RADIUS server IP address that must be included as part of the security settings for a WAP. Which of the following encryption types should the technician select?

Options:

A.

WPA enterprise

B.

TKIP

C.

WPA2 CCMP

D.

WEP 128-bit

Question 96

A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose?

Options:

A.

WEP

B.

WPS

C.

WPA

D.

WPA2

Question 97

A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this?

Options:

A.

143

B.

443

C.

3389

D.

8080

Question 98

Which of the following protocols can be implemented to provide encryption during transmission between email gateways?

Options:

A.

TLS

B.

PPTP

C.

SSH

D.

HTTPS

Question 99

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

Options:

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

Question 100

A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?

Options:

A.

QoS

B.

Install 802.11n WAP

C.

PoE

D.

Parabolic antenna

Question 101

Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?

Options:

A.

ipconfig

B.

ping

C.

sniffer

D.

route

Question 102

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Question 103

A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?

Options:

A.

Router firewall

B.

Ping and traceroute

C.

Throughput tester

D.

Protocol analyzer

Question 104

A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method?

Options:

A.

Load balancing

B.

High availability

C.

Caching engines

D.

Quality of Service

Question 105

A company needs to find a way to best route latency-sensitive traffic appropriately on an already congested network. Which of the following would be BEST suited for this purpose?

Options:

A.

QoS

B.

PPPoE

C.

RADIUS

D.

VPN

Question 106

A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?

Options:

A.

Establish a plan of action to resolve the problem.

B.

Test the theory to determine a cause.

C.

Re-establish a new theory or escalate.

D.

Implement the solution or escalate as necessary.

Question 107

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?

Options:

A.

Load balancing

B.

Traffic policing

C.

Caching engines

D.

Traffic shaping

Question 108

A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician use to complete this objective QUICKEST?

Options:

A.

Traffic analyzer

B.

Network sniffer

C.

SNMPv3

D.

System logs

Question 109

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

Options:

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Question 110

In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

Options:

A.

NMAP

B.

ping

C.

nslookup

D.

tracert

Question 111

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?

Options:

A.

Toner probe

B.

Loopback plug

C.

Protocol analyzer

D.

Multimeter

Question 112

Which of the following should be installed to prevent inappropriate websites from being viewed?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Content filter

D.

Proxy server

Question 113

Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination?

Options:

A.

route

B.

netstat

C.

traceroute

D.

ping 127.0.0.1

Question 114

A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?

Options:

A.

Network baseline

B.

Tracert

C.

System logs

D.

Protocol analyzer

Question 115

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?

Options:

A.

Network maps

B.

Traffic analysis

C.

Syslog

D.

ICMP

Question 116

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?

Options:

A.

Port analyzer

B.

Multimeter

C.

Network sniffer

D.

Cable certifier

Question 117

A technician has noticed that the RJ-45 connector on the end of a user’s patch cable was stripped too far back from the connector allowing for cross talk. Which of the following tools would a technician use to attach a new connector to eliminate this issue?

Options:

A.

Crimper

B.

Cable certifier

C.

Loopback plug

D.

Punch down tool

Question 118

Which of the following switches is used with ARP to display the cache entry for a specific IP address?

Options:

A.

-a

B.

-d

C.

-g

D.

-s

Question 119

An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?

Options:

A.

Run netstat

B.

Run dig

C.

Run nbtstat

D.

Run tracert

Question 120

Which of the following devices can be utilized to monitor and block websites accessible by a company?

Options:

A.

WINS server

B.

DNS server

C.

Content filter

D.

Reverse proxy

Question 121

A content filter is MOST likely installed on which of the following servers?

Options:

A.

Proxy server

B.

TACACS+ server

C.

DNS server

D.

DHCP server

Question 122

A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use?

Options:

A.

ipconfig /a

B.

ping -t

C.

ping -a

D.

netstat

Question 123

A public website using round robin DNS is an example of:

Options:

A.

load balancing

B.

QoS

C.

Caching engines

D.

Traffic shaping

Question 124

Drag and drop each networking tool to the MOST appropriate descriptor. Each tool may only be used once.

Options:

Page: 1 / 83
Total 828 questions