Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Note! CompTIA has retired the JK0-019 Exam Contact us through Live Chat or email us for more information.

JK0-019 CompTIA E2C Network + Certification Exam Questions and Answers

Questions 4

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?

Options:

A.

Set the VLAN preferences on the host's NIC

B.

Create each VLAN on the host's virtual switch

C.

Change the virtual machine NIC settings from private to bridged

D.

Create each VLAN on the host's gateway router

Buy Now
Questions 5

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?

Options:

A.

MIMO

B.

AP isolation

C.

Channel bonding

D.

Burst mode

Buy Now
Questions 6

Which of the following wireless router security measures provides access to a network by allowing only devices on an approved physical address list?

Options:

A.

Port filtering

B.

MAC filtering

C.

SSID masking

D.

Port forwarding

Buy Now
Questions 7

Which of the following should the last line of an ACL normally contain?

Options:

A.

Explicit allow

B.

Statically routed

C.

Random access

D.

Implicit deny

Buy Now
Questions 8

Which of the following network protocols is used for a secure command line interface for management of network devices?

Options:

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Buy Now
Questions 9

Which of the following can determine the last time an address lease was renewed on a network device?

Options:

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Buy Now
Questions 10

Which of the following devices acts as a gateway between clients and servers?

Options:

A.

WINS server

B.

Proxy server

C.

Content filter

D.

DNS server

Buy Now
Questions 11

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

Options:

A.

Asset management

B.

Baselines

C.

Network maps

D.

Change management

Buy Now
Questions 12

Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination?

Options:

A.

route

B.

netstat

C.

traceroute

D.

ping 127.0.0.1

Buy Now
Questions 13

When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?

Options:

A.

ping

B.

nbtstat

C.

arp

D.

msconfig

Buy Now
Questions 14

A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?

Options:

A.

TACACS+

B.

SNMP

C.

Syslog

D.

DOCSIS

Buy Now
Questions 15

A user reports that one of their critical programs no longer functions after a recent router upgrade in the office. A network technician is called in to troubleshoot the issue and documentation shows that the software needs full open connections over ports 558, 981, and 382 in order to function. Which of the following tools could the technician BEST use to troubleshoot this issue?

Options:

A.

NET USE

B.

IPCONFIG

C.

TRACEROUTE

D.

TELNET

Buy Now
Questions 16

A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

Options:

A.

RADIUS

B.

Single sign on

C.

Multifactor authentication

D.

Two-factor authentication

Buy Now
Questions 17

Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session?

Options:

A.

SCP

B.

SNMPv3

C.

SSL

D.

SSH

Buy Now
Questions 18

Which of the following should be installed to prevent inappropriate websites from being viewed?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Content filter

D.

Proxy server

Buy Now
Questions 19

A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?

Options:

A.

Network maps

B.

Change management

C.

Log analysis

D.

Protocol analyzer

Buy Now
Questions 20

Which of the following is needed when using WPA2-Enterprise wireless encryption?

Options:

A.

TFTP

B.

RADIUS

C.

LDAP

D.

IPSec

Buy Now
Questions 21

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?

Options:

A.

Signal strength

B.

SSID mismatch

C.

Channel mismatch

D.

Encryption mismatch

Buy Now
Questions 22

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Buy Now
Questions 23

A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

Options:

A.

WINS

B.

QoS

C.

NAT

D.

DHCP

Buy Now
Questions 24

Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

Options:

A.

Change management

B.

System logs

C.

Asset management

D.

Baselining

Buy Now
Questions 25

A technician grabs a network cable and connects two switches together. However, the ports fail to come up as indicated by the link lights. Which of the following is MOST likely the issue?

Options:

A.

Wrong subnet mask on the interfaces

B.

Mismatched MTU size

C.

Straight through instead of cross over cable

D.

SSID mismatch between the switches

Buy Now
Questions 26

A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO).

Options:

A.

Routing table

B.

Next hop

C.

Port mirroring

D.

Port monitoring

E.

VLANs

Buy Now
Questions 27

A technician is attempting to set up a new laptop for a user. The user’s old laptop connects to the corporate wireless network “CompanyWiFi” automatically. However, when the technician looks for the “CompanyWiFi” network on the new laptop, he does not find it in the list of available networks. Both laptops have 802.11g wireless network adapters and are sitting next to each other on the user’s desk. Which of the following would MOST likely be the reason that the new laptop cannot see the “CompanyWiFi” network?

Options:

A.

Loss of signal strength

B.

Incorrect WEP key was input

C.

RFID interference from other electronic devices

D.

SSID broadcasting is disabled on the WAP

Buy Now
Questions 28

Which of the following transmission methods do DHCP enabled devices use to request an IP address?

Options:

A.

Broadcast

B.

Directed broadcast

C.

Unicast

D.

Multicast

Buy Now
Questions 29

A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?

Options:

A.

MPLS

B.

Caching engines

C.

QoS

D.

Load balancing

Buy Now
Questions 30

A technician is troubleshooting a wireless network that was setup previously. The network is a hybrid of 802.11g and 802.11n WAPs. Users are not able to view or connect to the 802.11n WAPs. Which of the following is MOST likely the cause?

Options:

A.

The 802.11g WAPs are not setup for backwards compatibility.

B.

The 802.11n WAPs are using a 2.4 GHz frequency channel.

C.

The 802.11n WAPs are using a 5 GHz frequency channel.

D.

The 802.11g WAPs all have disabled SSID broadcast.

Buy Now
Questions 31

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?

Options:

A.

Run the dig command on the workstation.

B.

Run the nslookup command on the workstation.

C.

Run the ipconfig command on the workstation.

D.

Run the ifconfig command on the workstation.

Buy Now
Questions 32

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?

Options:

A.

Toner Probe

B.

Punch Down Tool

C.

Protocol Analyzer

D.

Butt Set

Buy Now
Questions 33

Which of the following routing protocols utilizes the DUAL algorithm for determining best path?

Options:

A.

EIGRP

B.

RIPv2

C.

OSPF

D.

RIP

Buy Now
Questions 34

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

Options:

A.

VLAN

B.

MPLS

C.

VPN

D.

PSTN

Buy Now
Questions 35

Standards such as JPEG and ASCII operate at which of the following OSI model layers?

Options:

A.

Presentation

B.

Data link

C.

Session

D.

Application

Buy Now
Questions 36

A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic?

Options:

A.

Duplex settings

B.

SNMP string

C.

VLAN assignments

D.

Spanning tree

Buy Now
Questions 37

A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT?

Options:

A.

Test the theory

B.

Question the user

C.

Document the outcome

D.

Verify functionality

Buy Now
Questions 38

In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented?

Options:

A.

Scope options

B.

Leases

C.

Reservations

D.

DNS suffixes

Buy Now
Questions 39

Which of the following are considered unsecure access methods? (Select TWO).

Options:

A.

FTP

B.

IPSec

C.

RCP

D.

SCP

E.

SFTP

Buy Now
Questions 40

Which of the following port numbers needs to be open on a firewall to allow FTP traffic?

Options:

A.

21

B.

22

C.

23

D.

25

Buy Now
Questions 41

Which of the following is the definition of a DNS server?

Options:

A.

Hosts proprietary business applications

B.

Translates FQDN’s to IP addresses

C.

Provides network IDS/IPS security

D.

Assigns IP addresses to network devices

Buy Now
Questions 42

A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task?

Options:

A.

Media convertor

B.

Switch

C.

Firewall

D.

Bridge

Buy Now
Questions 43

A MAC address is a part of which of the following OSI model layers?

Options:

A.

Network

B.

Data Link

C.

Physical

D.

Transport

Buy Now
Questions 44

The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model?

Options:

A.

Layer 2

B.

Layer 5

C.

Layer 6

D.

Layer 7

Buy Now
Questions 45

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?

Options:

A.

Layer 1

B.

Layer 3

C.

Layer 5

D.

Layer 7

Buy Now
Questions 46

A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO).

Options:

A.

IDS

B.

Repeater

C.

Switch

D.

WAP

E.

UTM device

Buy Now
Questions 47

Which of the following protocols occurs at Layer 4 of the OSI model?

Options:

A.

ISDN

B.

IPX

C.

GRE

D.

UDP

Buy Now
Questions 48

Assigning the same IP address to a network device is which of the following?

Options:

A.

SSID

B.

Scope

C.

Reservation

D.

Lease

Buy Now
Questions 49

While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate?

Options:

A.

It is the default route.

B.

This is the address for the DHCP server.

C.

The PC has not been assigned an IP address.

D.

The firewall is down.

Buy Now
Questions 50

The term virtual switch refers to which of the following?

Options:

A.

A switch that has not yet been implemented in the local network

B.

Migrating an entire environment to virtualization

C.

A computer component that controls environmental elements, such as lights and thermometers

D.

A logical, rather than a physical switch device

Buy Now
Questions 51

After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process?

Options:

A.

Implement the solution to the problem.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Implement preventative measures.

Buy Now
Questions 52

A customer has requested that a new piece of network equipment be installed so that the customer can have multiple subnets for each department, but allow network traffic from each department to reach one another without the use of a router. Which of the following network devices would satisfy this customer’s requirements?

Options:

A.

Packet filter

B.

Layer 3 switch

C.

Stateful firewall

D.

Wireless bridge

Buy Now
Questions 53

Which of the following is the unit used to transfer information at Layer 2 of the OSI model?

Options:

A.

Packet

B.

Socket

C.

Session

D.

Frame

Buy Now
Questions 54

Which of the following network protocols is used to transport email across the Internet?

Options:

A.

NTP

B.

SSH

C.

SMTP

D.

SNMP

Buy Now
Questions 55

Which of the following commands displays the routing table on a server or workstation?

Options:

A.

nbtstat

B.

route

C.

traceroute

D.

nmap

Buy Now
Questions 56

The components of a NIC function at which of the following layers of the OSI model? (Select TWO).

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Buy Now
Questions 57

Which of the following addresses is a class B private address?

Options:

A.

132.216.14.184

B.

152.119.25.213

C.

162.17.43.22

D.

172.23.226.34

Buy Now
Questions 58

A technician is installing 802.11a wireless access points in an open warehouse 300 feet (91.44 meters) long and 200 feet (60.96 meters) wide. Which of the following would be the LEAST number of devices needed to provide coverage to the entire building?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 59

Which of the following wireless standards provide speed of 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 60

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

Options:

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Buy Now
Questions 61

Which of the following connectors are MOST commonly used on a POTS line?

Options:

A.

RJ-45

B.

MTRJ

C.

DB-9

D.

RJ-11

Buy Now
Questions 62

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?

Options:

A.

MDF

B.

VPN

C.

RDP

D.

IDF

Buy Now
Questions 63

The unit responsible for the successful shaping and transmission of a digital signal is called:

Options:

A.

demarc.

B.

T1 hub.

C.

smart jack.

D.

CSU/DSU.

Buy Now
Questions 64

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

Options:

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Buy Now
Questions 65

Drag and drop the following maximum speeds to their corresponding wireless standards. Tokens can be used more than once.

Options:

Buy Now
Questions 66

Which of the following network topologies is MOST likely used in remote access VPN?

Options:

A.

Point to Point

B.

Bus

C.

Ring

D.

Mesh

Buy Now
Questions 67

Which of the following is rated for speeds over 800Mbps?

Options:

A.

Coaxial

B.

DB-9

C.

CAT6

D.

CAT5e

Buy Now
Questions 68

A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT?

Options:

A.

Open shorts

B.

Excessive DB loss

C.

TXRX reversed

D.

Split cables

Buy Now
Questions 69

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?

Options:

A.

Crosstalk

B.

Bad connectors

C.

Wrong DNS

D.

Duplicate IP address

Buy Now
Questions 70

Which wireless standard works at a MAXIMUM data rate of up to 54Mbps?

Options:

A.

802.11b

B.

802.11g

C.

802.11n

D.

802.1q

Buy Now
Questions 71

Which of the following technologies can change channel widths?

Options:

A.

802.11a

B.

802.11b

C.

802.11n

D.

Bluetooth

Buy Now
Questions 72

802.11n can operate at which of the following frequencies? (Select TWO).

Options:

A.

2.4Mhz

B.

2.5Mhz

C.

5Mhz

D.

2.4Ghz

E.

2.5Ghz

F.

5Ghz

Buy Now
Questions 73

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

Options:

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Buy Now
Questions 74

Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?

Options:

A.

OTDR

B.

Protocol analyzer

C.

Toner probe

D.

Cable certifier

Buy Now
Questions 75

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?

Options:

A.

Attenuation

B.

Latency

C.

Crosstalk

D.

External interference

Buy Now
Questions 76

Which of the following WAN technologies has synchronous up/down speeds?

Options:

A.

T1

B.

ADSL

C.

Satellite

D.

Cable broadband

Buy Now
Questions 77

Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:

Options:

A.

Virtual desktops.

B.

Switches.

C.

PBXs.

D.

Virtual servers.

Buy Now
Questions 78

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?

Options:

A.

36, 40, 44, 48

B.

36, 44, 52, 60

C.

36, 44, 48, 52

D.

36, 48, 60, 64

Buy Now
Questions 79

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?

Options:

A.

RS-232

B.

Rollover cable

C.

Loopback

D.

Point to point cable

Buy Now
Questions 80

A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Buy Now
Questions 81

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

Options:

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Buy Now
Questions 82

Which of the following is used to allow multiple sources on a single optical cable?

Options:

A.

HSPA+

B.

MIMO

C.

DWDM

D.

SONET

Buy Now
Questions 83

The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:

Options:

A.

patch management

B.

security limitations

C.

documentation

D.

social engineering

Buy Now
Questions 84

Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?

Options:

A.

WPA2-CCMP

B.

WPA

C.

WEP

D.

WPA2-TKIP

Buy Now
Questions 85

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?

Options:

A.

MAC filtering

B.

Digital signatures

C.

MS-CHAP

D.

CHAP

Buy Now
Questions 86

A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?

Options:

A.

Two-factor authentication

B.

Network access control

C.

Multifactor authentication

D.

Single sign-on

Buy Now
Questions 87

Which of the following provides the STRONGEST security for a tunneled connection over the Internet?

Options:

A.

RDP

B.

SMTP

C.

RAS

D.

IPSec

Buy Now
Questions 88

Which of the following protocols can be implemented to provide encryption during transmission between email gateways?

Options:

A.

TLS

B.

PPTP

C.

SSH

D.

HTTPS

Buy Now
Questions 89

Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots?

Options:

A.

Social engineering

B.

War chalking

C.

WPA cracking

D.

Packet sniffing

Buy Now
Questions 90

Which of the following is the wireless encryption standard associated with WPA2?

Options:

A.

AES-CCMP

B.

EAP

C.

WEP

D.

802.1x

Buy Now
Questions 91

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?

Options:

A.

Multi-factor authentication

B.

Two-factor authentication

C.

Biometrics

D.

Single sign-on

Buy Now
Questions 92

A strong network firewall would likely support which of the following security features for controlling access? (Select TWO).

Options:

A.

War driving

B.

War chalking

C.

MAC filtering

D.

FTP bouncing

E.

Port filtering

Buy Now
Questions 93

A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?

Options:

A.

Implicit deny

B.

HTTP transports over UDP

C.

Website is down

D.

DNS server failure

Buy Now
Questions 94

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?

Options:

A.

WEP

B.

CCMP

C.

TKIP

D.

CHAP

Buy Now
Questions 95

Which of the following are authentication methods that can use AAA authentication? (Select TWO).

Options:

A.

Kerberos

B.

PKI

C.

TKIP/AES

D.

MS-CHAP

E.

RADIUS

F.

TACACS+

Buy Now
Questions 96

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

Options:

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

Buy Now
Questions 97

Which of the following would a network administrator use to scan a network for vulnerabilities?

Options:

A.

ICMP

B.

NMAP

C.

ACL

D.

TCPDUMP

Buy Now
Questions 98

Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?

Options:

A.

PKI

B.

Kerberos

C.

TACACS+

D.

RADIUS

Buy Now
Questions 99

Which of the following remote access types requires a certificate for connectivity?

Options:

A.

SSH

B.

PPP

C.

HTTPS

D.

WEP

Buy Now
Questions 100

An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity?

Options:

A.

Forwarding proxy

B.

Port address translation

C.

DMZ port security

D.

Application inspection

Buy Now
Questions 101

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Options:

A.

SYN flood

B.

Teardrop

C.

Smurf

D.

FTP bounce

Buy Now
Questions 102

Encryption provides which of the following to data being transferred across the network?

Options:

A.

Confidentiality

B.

Resistance to Jitter

C.

High Availability

D.

Data Integrity

Buy Now
Questions 103

A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions?

Options:

A.

A VPN concentrator

B.

A switch

C.

A router

D.

A firewall

Buy Now
Questions 104

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?

Options:

A.

A 12 port unmanaged switch.

B.

A wired router with an 8 port switch and a WAN port.

C.

A wireless router with an 8 port switch, and a WAN port.

D.

A 8 port firewall with one console port.

Buy Now
Questions 105

Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP’s to use?

Options:

A.

Conduct a wireless survey of the back warehouse.

B.

Ask the vendor that provided the WAP’s for the main warehouse for recommendations.

C.

Ask the systems administrator which WAP’s are preferred.

D.

Only order WAP’s that support 5GHz channels.

Buy Now
Questions 106

Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 107

During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?

Options:

A.

WPA2, SSID enabled, and 802.11n.

B.

WEP, SSID enabled, and 802.11b.

C.

WEP, SSID disabled, and 802.11g.

D.

WPA2, SSID disabled, and 802.11a.

Buy Now
Questions 108

Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?

Options:

A.

Create a MAC filter containing the current users.

B.

Turn off SSID broadcast.

C.

Change the encryption type to AES 256-bit for current users.

D.

Reduce the signal strength to 0 percent.

Buy Now
Questions 109

If a technician does not assign an IP address to a device, the DHCP server will assign the device a:

Options:

A.

static IP address.

B.

reservation.

C.

dynamic IP address.

D.

MAC address.

Buy Now
Questions 110

A technician is troubleshooting a printing issue where some users in an office are unable to print. Which of the following should be the FIRST step in troubleshooting this issue?

Options:

A.

Reboot each of the workstations

B.

Ask users if anything changed in their environment recently

C.

Advise users to move to a different office

D.

Power cycle the printer

Buy Now
Questions 111

A technician is reviewing the following company diagram to determine proper connectivity settings:

Which of the following device configurations is out of specifications?

Options:

A.

LaptopC

B.

ServerE

C.

LaptopB

D.

ServerA

E.

PC1

Buy Now
Questions 112

A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?

Options:

A.

Signal strength

B.

Interference

C.

AP placement

D.

Incorrect SSID

Buy Now
Questions 113

Which of the following is a terminal emulator used to manage a network device?

Options:

A.

VPN

B.

IDS

C.

PuTTY

D.

IPS

Buy Now
Questions 114

A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended?

Options:

A.

Change the SSID to be unique for each WAP.

B.

Change the antenna direction to be unique for each WAP.

C.

Change the encryption method to be unique for each WAP.

D.

Change the channel to be unique for each WAP.

Buy Now
Questions 115

Which of the following tools would a technician use to determine if a CAT6 patch cable has an open or short?

Options:

A.

OTDR

B.

Cable tester

C.

Toner probe

D.

Protocol analyzer

Buy Now
Questions 116

Which of the following BEST describes a load balancer?

Options:

A.

A device that splits traffic between multiple nodes of a clustered service.

B.

A device that allows multiple computers to access the internet through a single public IP address.

C.

A device that filters internet content based on rules and ACLs.

D.

A device that separates users onto separate WAPs for even distribution.

Buy Now
Questions 117

Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?

Options:

A.

Content filter

B.

VPN concentrator

C.

Load balancer

D.

Proxy server

Buy Now
Questions 118

A technician is upgrading the wiring in an older office building. The building currently contains some CAT3, CAT5, and CAT6 cables. The technician cannot visually distinguish between the cables because they are all the same color. Which of the following tools would help the technician determine which wires are the CAT3 and CAT5 cables needing to be replaced with CAT6 ones?

Options:

A.

Cable certifier

B.

Toner probe

C.

Cable tester

D.

Crimper

Buy Now
Questions 119

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

Options:

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Buy Now
Questions 120

An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?

Options:

A.

SNMPv3

B.

VTP

C.

CDP

D.

IPSec

Buy Now
Questions 121

A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).

Options:

A.

OC3 line with built-in firewall

B.

DS3 line with a separate firewall

C.

Cable modem with a separate firewall

D.

Dial-up modem with separate firewall

E.

DSL router with firewall capabilities

Buy Now
Questions 122

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).

Options:

A.

Cable certifier

B.

Ping command

C.

Punch down tool

D.

Crimper

E.

Toner probe

Buy Now
Questions 123

A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use?

Options:

A.

Loopback plug

B.

Multimeter

C.

Punch down

D.

Crimper

Buy Now
Questions 124

A server that filters traffic between a WAN and a LAN is which of the following?

Options:

A.

Proxy server

B.

RAS server

C.

Default gateway

D.

Email server

Buy Now
Exam Code: JK0-019
Exam Name: CompTIA E2C Network + Certification Exam
Last Update: Apr 14, 2023
Questions: 828