Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors
Note! The JK0-019 Exam is no longer available.

JK0-019 CompTIA E2C Network + Certification Exam Questions and Answers

Questions 4

When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?

Options:

A.

Implement multiple wireless encryption techniques.

B.

Implement PoE on each WAP.

C.

Decrease signal strength.

D.

Increase signal strength.

Buy Now
Questions 5

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?

Options:

A.

Managed

B.

Software

C.

Hardware

D.

Wireless

Buy Now
Questions 6

Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?

Options:

A.

MAC filtering

B.

RAS

C.

SSL VPN

D.

L2TP

Buy Now
Questions 7

A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?

Options:

A.

Implement 802.11i on all switches in the network.

B.

Implement port security on all computers in the company.

C.

Implement port security on all switches in the network.

D.

Implement rules on the firewall to block unknown devices.

Buy Now
Questions 8

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

Buy Now
Questions 9

The network administrator has been tasked to create a network segment where resources can be placed for public web access.

Which of the following should be implemented?

Options:

A.

DMZ

B.

Honeynet

C.

PAT

D.

Port security

Buy Now
Questions 10

Which of the following network devices is meant to actively protect against network treats and can disable connections to stop malicious traffic if necessary?

Options:

A.

DMZ

B.

IPS

C.

SSL VPN

D.

Layer 3 switch

Buy Now
Questions 11

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Buy Now
Questions 12

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

Options:

A.

SSL

B.

IPSec

C.

Kerberos

D.

RDP

E.

L2TP

F.

PPTP

Buy Now
Questions 13

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

Options:

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Buy Now
Questions 14

A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?

(1) 1000 foot CAT6 spool

(1) crimper

(1) 16 port gigabit switch

(20) RJ-45 connectors

(12) RJ-45 wall jacks

(1) ____________

Options:

A.

Compression tool

B.

Punch down tool

C.

Network map

D.

Multimeter

Buy Now
Questions 15

Which of the following should be installed to prevent inappropriate websites from being viewed?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Content filter

D.

Proxy server

Buy Now
Questions 16

Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time?

Options:

A.

Burst-frame

B.

Full-duplex

C.

Half-duplex

D.

VoIP

Buy Now
Questions 17

Which of the following would a technician do to monitor remote traffic through an access point?

Options:

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Buy Now
Questions 18

Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?

Options:

A.

Cable has been looped too many times.

B.

Cable has a twist tie attached too close to the connector.

C.

Cable is too warm.

D.

Cable is run too close to a fluorescent light.

Buy Now
Questions 19

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?

Options:

A.

Configure Wi-Fi Multimedia support

B.

Use only 20 MHz channel bandwidth

C.

Enable band steering to use 802.11n

D.

Configure Quality of Service

Buy Now
Questions 20

Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO).

Options:

A.

Dialup

B.

DSL

C.

SONET

D.

Cable

E.

WiMAX

F.

LTE

Buy Now
Questions 21

A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?

Options:

A.

Behavior based IPS

B.

Signature based IDS

C.

Antivirus software

D.

Access Control Lists

Buy Now
Questions 22

Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?

Options:

A.

IP filtering

B.

Port filtering

C.

MAC address filtering

D.

DHCP lease

Buy Now
Questions 23

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

Options:

A.

SNMPv2 access only

B.

TELNET access only

C.

SSH access only

D.

Console access only

Buy Now
Questions 24

Dynamic DNS provides which of the following services?

Options:

A.

Automatic registration of host records

B.

Translates public host names to private host names

C.

Provides round robin load balancing for web servers

D.

Provides aliases for additional search suffixes

Buy Now
Questions 25

A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?

Options:

A.

Two-factor authentication

B.

Biometric security

C.

Multi-factor authentication

D.

Single factor authentication

Buy Now
Questions 26

Which of the following security appliances are used to only identify traffic on individual systems?

Options:

A.

Host based IPS

B.

Application based IPS

C.

Network based IDS

D.

Host based IDS

Buy Now
Questions 27

The term virtual switch refers to which of the following?

Options:

A.

A switch that has not yet been implemented in the local network

B.

Migrating an entire environment to virtualization

C.

A computer component that controls environmental elements, such as lights and thermometers

D.

A logical, rather than a physical switch device

Buy Now
Questions 28

Which of the following cable types supports the FURTHEST distance when connecting various MDFs?

Options:

A.

Multimode

B.

UTP

C.

Singlemode

D.

CAT6

Buy Now
Questions 29

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?

Options:

A.

Network maps

B.

Traffic analysis

C.

Syslog

D.

ICMP

Buy Now
Questions 30

Which of the following OSI model layers is used to order packets which may have arrived out of order?

Options:

A.

Transport

B.

Presentation

C.

Network

D.

Session

Buy Now
Questions 31

A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO).

Options:

A.

IDS

B.

Repeater

C.

Switch

D.

WAP

E.

UTM device

Buy Now
Questions 32

The MAC address of a network device is used to communicate at which of the following OSI layers?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 5

Buy Now
Questions 33

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).

Options:

A.

172.16.0.255

B.

172.16.0.0

C.

172.16.1.1

D.

172.16.8.0

E.

172.16.256.255

Buy Now
Questions 34

Which of the following uses port 23 by default?

Options:

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

Buy Now
Questions 35

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?

Options:

A.

RADIUS

B.

DNS

C.

DHCP

D.

IDS

Buy Now
Questions 36

An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection?

Options:

A.

RDP

B.

RTP

C.

RIP

D.

RAS

Buy Now
Questions 37

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Buy Now
Questions 38

Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?

Options:

A.

Test the theory

B.

Establish a plan of action

C.

Establish a theory

D.

Document findings

Buy Now
Questions 39

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

Options:

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Buy Now
Questions 40

Which of the following BEST describes a load balancer?

Options:

A.

A device that splits traffic between multiple nodes of a clustered service.

B.

A device that allows multiple computers to access the internet through a single public IP address.

C.

A device that filters internet content based on rules and ACLs.

D.

A device that separates users onto separate WAPs for even distribution.

Buy Now
Questions 41

Which of the following requires congestion to occur before enabling traffic prioritization?

Options:

A.

Quality of Service

B.

IGMP snooping

C.

Flow control

D.

WAN optimization

Buy Now
Questions 42

A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?

Options:

A.

QoS

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Buy Now
Questions 43

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?

Options:

A.

Content filter

B.

Packet filter

C.

IPS

D.

IDS

Buy Now
Questions 44

Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?

Options:

A.

Traffic shaping

B.

Proxy server

C.

VPN concentrator

D.

High availability

Buy Now
Questions 45

When implementing video streaming from the Internet to an always on device, it is best to employ which of the following services to minimize latency issues?

Options:

A.

QoS

B.

EIGRP

C.

PPTP

D.

OSPF

Buy Now
Questions 46

Drag and drop each networking tool to the MOST appropriate descriptor. Each tool may only be used once.

JK0-019 Question 46

Options:

Buy Now
Questions 47

Which of the following can be configured on a managed network switch to send real time alerts to a technician?

Options:

A.

SSID

B.

SMTP

C.

SNMP

D.

Syslog

Buy Now
Questions 48

At which of the following layers of the OSI model is the Logical Link Control found?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Buy Now
Questions 49

At which of the following layers of the OSI model do packets exist?

Options:

A.

Network

B.

Session

C.

Data Link

D.

Transport

Buy Now
Questions 50

Which of the following protocols does DNS utilize on port 53?

Options:

A.

TCP

B.

FTP

C.

RTP

D.

ICMP

Buy Now
Questions 51

Which of the following is a common physical network topology?

Options:

A.

Cross-over

B.

Loopback

C.

Star

D.

Straight

Buy Now
Questions 52

Which of the following network protocols is used to transport email between servers?

Options:

A.

IMAP4

B.

POP3

C.

SNMP

D.

SMTP

Buy Now
Questions 53

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?

Options:

A.

PoE

B.

STP

C.

NAT

D.

VTP

Buy Now
Questions 54

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

Options:

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Buy Now
Questions 55

Which of the following connectors is usable in SFP modules?

Options:

A.

ST

B.

LC

C.

LX

D.

SX

Buy Now
Questions 56

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?

Options:

A.

Run the dig command on the workstation.

B.

Run the nslookup command on the workstation.

C.

Run the ipconfig command on the workstation.

D.

Run the ifconfig command on the workstation.

Buy Now
Questions 57

The DHCP server leases IP addresses 10.162.233.158 to WBAC11 for a period of 14 days. At which of the following times would WBAC11 send an initial request to the DHCP server to renew the IP address lease?

Options:

A.

Day 4

B.

Day 6

C.

Day 8

D.

Day 10

Buy Now
Questions 58

A user reports that several spots within the company’s office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem?

Options:

A.

Incompatible network card

B.

Channel overlap

C.

Latency

D.

WEP encryption

Buy Now
Questions 59

A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT?

Options:

A.

Ask the users for more information, such as which applications were not functioning.

B.

Power-cycle the switch that the users share to clear out cached DNS records.

C.

Escalate the issue to the network administrator to have their domain credentials reset.

D.

Close and document the service call, as there was no actual issue affecting the users.

Buy Now
Questions 60

Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

Options:

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Buy Now
Questions 61

Which of the following is needed when using WPA2-Enterprise wireless encryption?

Options:

A.

TFTP

B.

RADIUS

C.

LDAP

D.

IPSec

Buy Now
Questions 62

Which of the following performance benefits would multiple domain controllers BEST provide?

Options:

A.

Fault tolerance

B.

Caching engine

C.

Proxy server

D.

Quality of service

Buy Now
Questions 63

Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?

Options:

A.

Alter the domain account login policies to reflect the most common application rule sets.

B.

Ensure that the user accounts are properly configured in domain services.

C.

Implement a software solution that facilitates single sign-on authentication.

D.

Increase the time between mandatory password changes by a factor of three.

Buy Now
Questions 64

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed?

Options:

A.

The network address translation IP range.

B.

The signal strength of the router.

C.

The DCHP lease time.

D.

The number of allowable MAC addresses.

Buy Now
Questions 65

A technician has determined that calls placed over a wireless connection are breaking up and the speaker’s voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues?

Options:

A.

Latency

B.

Bad GBIC

C.

Bad SFP

D.

SSID mismatch

Buy Now
Questions 66

A computer configured by DHCP has a listed DNS server and gateway. Which of the following allows these settings to be configured?

Options:

A.

Reservations

B.

Leases

C.

Scopes

D.

Options

Buy Now
Questions 67

A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?

Options:

A.

Increase the number of reservations

B.

Increase exclude list

C.

Decrease lease times

D.

Decrease the scope

Buy Now
Questions 68

Which of the following would allow for a specific device to receive the same IP address from a DHCP server?

Options:

A.

Scope

B.

Reservation

C.

Suffix

D.

Lease

Buy Now
Questions 69

A technician is reviewing the following aggregated information on a server to determine the cause of a user’s connection problem:

JK0-019 Question 69

Which of the following is the technician reviewing?

Options:

A.

Syslog server logs

B.

Application logs

C.

Network sniffer logs

D.

SNMPv2 queries

Buy Now
Questions 70

A network administrator is planning to install wireless access points across the enterprise. Which of the following should be considered when installing at remote locations?

Options:

A.

PoE

B.

BSSID

C.

MAC filtering

D.

NAT

Buy Now
Questions 71

A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?

Options:

A.

Wrong encryption type

B.

SSID mismatch

C.

Signal bounce

D.

Incorrect channel

Buy Now
Questions 72

A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).

Options:

A.

That there is strong encryption enabled and configured on the access point.

B.

The user’s home network has a correctly completed WHOIS entry.

C.

The access point is broadcasting the SSID based upon manufacturer’s standards.

D.

There are no conflicts of channels in use by neighboring wireless networks.

E.

There are redundant internal DNS names set in the access point’s settings.

F.

That the access point’s MAC address is properly set in its configuration settings.

Buy Now
Questions 73

When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?

Options:

A.

Denial of service attack

B.

MTU black hole

C.

Switching loop

D.

Defective patch cable

Buy Now
Questions 74

During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?

Options:

A.

WPA2, SSID enabled, and 802.11n.

B.

WEP, SSID enabled, and 802.11b.

C.

WEP, SSID disabled, and 802.11g.

D.

WPA2, SSID disabled, and 802.11a.

Buy Now
Questions 75

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?

Options:

A.

Decrease signal strength on the antenna

B.

Change the wireless channel on the WAP

C.

Change the device placement to further obfuscate the signal

D.

Set up encryption on the WAP and clients

Buy Now
Questions 76

A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?

Options:

A.

Environmental monitor

B.

Multimeter

C.

Toner probe

D.

Protocol analyzer

Buy Now
Questions 77

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?

Options:

A.

Broadcast storm

B.

TX/RX cables reversed

C.

Mismatched MTU

D.

Incorrect routing table

Buy Now
Questions 78

Which of the following connector types is MOST commonly used for serial connections?

Options:

A.

MTRJ

B.

RJ-11

C.

RS-232

D.

RJ-45

Buy Now
Questions 79

A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Buy Now
Questions 80

Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:

Options:

A.

Virtual desktops.

B.

Switches.

C.

PBXs.

D.

Virtual servers.

Buy Now
Questions 81

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?

Options:

A.

Attenuation

B.

Latency

C.

Crosstalk

D.

External interference

Buy Now
Questions 82

You have been tasked with testing a CAT5 cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the best results and select the options that explains the results.

JK0-019 Question 82

JK0-019 Question 82

Options:

Buy Now
Questions 83

A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?

Options:

A.

Premise router

B.

ISP router

C.

Smart jack

D.

CSU/DSU

Buy Now
Questions 84

Which of the following wireless standards has a maximum rate of less than 50 Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 85

Which of the following is used for SONET connections and requires a wavelength of 1310nm?

Options:

A.

10GBASECX4

B.

10GBASELX4

C.

10GBASELW

D.

10GBASESR

Buy Now
Questions 86

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Buy Now
Questions 87

The unit responsible for the successful shaping and transmission of a digital signal is called:

Options:

A.

demarc.

B.

T1 hub.

C.

smart jack.

D.

CSU/DSU.

Buy Now
Questions 88

Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running?

Options:

A.

CAT5

B.

CAT6

C.

Coaxial

D.

Fiber

Buy Now
Questions 89

Which of the following technologies is used to connect public networks using POTS lines?

Options:

A.

OC3

B.

OC12

C.

PSTN

D.

Cable

Buy Now
Questions 90

Which of the following would be considered a Demarc extension?

Options:

A.

A patch cable connecting a cable modem with a wireless router

B.

Patch panel wiring

C.

Punch down block wiring

D.

Copper wire connecting the main PSTN point of entry to a wall data outlet

Buy Now
Questions 91

Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

GBIC

C.

MT-RJ

D.

SC

Buy Now
Questions 92

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?

Options:

A.

Crosstalk

B.

Bad connectors

C.

Wrong DNS

D.

Duplicate IP address

Buy Now
Questions 93

Which of the following is true of a client/server topology?

Options:

A.

Virtual servers are used to stream data to other remote servers

B.

Servers are used to connect to centralized clients

C.

Remote clients connect to a centralized server

D.

Remote clients connect to each other via a virtual server

Buy Now
Questions 94

Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires?

Options:

A.

Coaxial

B.

CAT3

C.

CAT5

D.

CAT6a

Buy Now
Questions 95

A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?

Options:

A.

dB loss

B.

Distance

C.

Incorrect connector type

D.

EMI

E.

Crosstalk

Buy Now
Questions 96

Which of the following WAN technologies has the highest latency?

Options:

A.

POTS

B.

Cable

C.

Satellite

D.

DSL

Buy Now
Questions 97

Which of the following is the Telco end of a T1 demarc?

Options:

A.

Smart jack

B.

Network tap

C.

Proxy server

D.

IDF

Buy Now
Questions 98

An 802.11b wireless network has a maximum data rate of:

Options:

A.

11 Mbps.

B.

20 Mbps.

C.

28 Mbps.

D.

54 Mbps.

Buy Now
Questions 99

A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario?

Options:

A.

Protocol analyzer

B.

Punch down tool

C.

Multimeter

D.

Toner probe

Buy Now
Questions 100

A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future?

Options:

A.

Change management

B.

Cable management

C.

Asset management

D.

Setting baselines

Buy Now
Questions 101

An administrator wants to translate an internal workstation name to an IP address. Which of the following commands would be used?

Options:

A.

ifconfig

B.

nslookup

C.

netstat

D.

ipconfig

Buy Now
Questions 102

Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?

Options:

A.

Cable tester

B.

Punch down tool

C.

Crimper

D.

Multimeter

Buy Now
Questions 103

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?

Options:

A.

Honeypot

B.

Butt set

C.

Spyware

D.

Blue jacking

Buy Now
Questions 104

A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?

Options:

A.

arp

B.

nslookup

C.

ipconfig

D.

netstat

Buy Now
Questions 105

A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?

Options:

A.

Verify full system functionality

B.

Identify the problem

C.

Establish a theory

D.

Implement the solution

Buy Now
Questions 106

Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?

Options:

A.

VLAN tags

B.

SNMP

C.

Packet sniffer

D.

Syslog

Buy Now
Questions 107

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).

Options:

A.

Cable certifier

B.

Ping command

C.

Punch down tool

D.

Crimper

E.

Toner probe

Buy Now
Questions 108

A company has a server with redundant power supplies. Which of the following is this an example of?

Options:

A.

Traffic shaping

B.

Caching engines

C.

Fault tolerance

D.

Load balancing

Buy Now
Questions 109

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used?

Options:

A.

Virtual switch

B.

Virtual server

C.

Virtual desktop

D.

Virtual PBX

Buy Now
Questions 110

Which IEEE protocol is used with VLAN technology?

Options:

A.

802.11a

B.

802.11b

C.

802.1m

D.

802.1q

Buy Now
Questions 111

Which of the following protocols is used by Windows to securely access a remote computer?

Options:

A.

RAS

B.

Telnet

C.

PPP

D.

RDP

Buy Now
Questions 112

The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this?

Options:

A.

Allow VLAN routing

B.

Enable packet filtering on the switch

C.

Allow remote administration of the switch

D.

Enable MAC filtering on the switch

Buy Now
Questions 113

Which of the following describes a manually entered route?

Options:

A.

Static

B.

Dynamic

C.

Multicast

D.

Unicast

Buy Now
Questions 114

Spanning-Tree Protocol is used with which of the following network devices?

Options:

A.

Router

B.

NIC

C.

Switch

D.

DHCP server

Buy Now
Questions 115

A user is unable to access any network resources. The IP configuration of the workstation is as follows:

IP Address: 192.168.10.32

Subnet Mask: 255.255.255.240

Default Gateway: 192.168.10.46

Which of the following would allow the user to connect to network resources?

Options:

A.

Change the default gateway to 192.168.10.1

B.

Change the default gateway to 192.168.10.254

C.

Change the IP address to 192.168.10.31

D.

Change the IP address to 192.168.10.33

Buy Now
Questions 116

A user reports that they are unable to connect to the network. Upon further investigation, a technician notices that the user has an IP address/subnet mask combination of 192.168.204.255/24. The default gateway for the network is 192.168.204.254. Which of the following could the user’s IP address be changed to so that they could connect to the network?

Options:

A.

192.168.204.0/27

B.

192.168.204.1/27

C.

192.168.204.112/24

D.

192.168.204.254/24

Buy Now
Questions 117

Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).

Options:

A.

Switch

B.

Cable

C.

Repeater

D.

Router

E.

Bridge

F.

Hub

Buy Now
Questions 118

Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots?

Options:

A.

Social engineering

B.

War chalking

C.

WPA cracking

D.

Packet sniffing

Buy Now
Questions 119

A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?

Options:

A.

Network sniffer

B.

Syslog

C.

SNMPv3

D.

System logs

Buy Now
Questions 120

Which of the following can be described as a DoS attack?

Options:

A.

Disabling a specific system and making it unavailable to users

B.

Implementing a keylogger

C.

Intercepting a packet and decrypting the contents

D.

Communicating with employees to get company information

Buy Now
Questions 121

Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?

Options:

A.

WEP cracking

B.

WPA cracking

C.

War driving

D.

Rogue access point

Buy Now
Questions 122

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Buy Now
Questions 123

Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?

Options:

A.

PKI

B.

Kerberos

C.

TACACS+

D.

RADIUS

Buy Now
Questions 124

An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)

Options:

A.

20

B.

21

C.

22

D.

23

E.

25

F.

53

Buy Now
Exam Code: JK0-019
Exam Name: CompTIA E2C Network + Certification Exam
Last Update: Nov 27, 2023
Questions: 828
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024