New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! CompTIA has retired the JK0-023 Exam Contact us through Live Chat or email us for more information.

JK0-023 CompTIA Network+ certification Questions and Answers

Questions 4

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

Options:

A.

Hub

B.

VLAN

C.

Router

D.

Server

Buy Now
Questions 5

Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?

Options:

A.

Caching

B.

Load balancing

C.

Port filtering

D.

Traffic analyzer

Buy Now
Questions 6

A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?

Options:

A.

Cable certifier

B.

Throughput tester

C.

Loopback plug

D.

Multimeter

Buy Now
Questions 7

A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols?

Options:

A.

HTTPS

B.

POP3

C.

SSH

D.

SMTP

Buy Now
Questions 8

A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this?

Options:

A.

143

B.

443

C.

3389

D.

8080

Buy Now
Questions 9

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion:

msgUsername:

msgAuthenticationParameters:

msgPrivacyParameters:

msgData:

data: get-request

request-id:

error-status: noError (0)

error-index: 0

variable-bindings: 0 items

Options:

A.

SNMPv3

B.

SSH

C.

HTTP

D.

SNMPv1

Buy Now
Questions 10

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

Options:

A.

20

B.

53

C.

80

D.

3389

Buy Now
Questions 11

The MAC address of a network device is used to communicate at which of the following OSI layers?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 5

Buy Now
Questions 12

At which of the following layers of the OSI model does an unmanaged switch operate?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Buy Now
Questions 13

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.192

D.

255.255.255.248

Buy Now
Questions 14

A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation?

Options:

A.

UTP

B.

Plenum

C.

Coaxial

D.

STP

Buy Now
Questions 15

A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?

Options:

A.

ipconfig

B.

nslookup

C.

dig

D.

tracert

Buy Now
Questions 16

A consultant is installing new WAPs for an office using wall mounts. Which of the following is the BEST location for the new boxes for signal strength and coverage?

Options:

A.

Above the suspended ceiling with antennas positioned upward.

B.

Close to the floor level to allow the signal to traverse the floor laterally.

C.

Close to the suspended ceiling, but not above.

D.

Above the suspended ceiling with antennas positioned downward.

Buy Now
Questions 17

Which of the following is used to create a secure connection between a client and a host?

Options:

A.

VLAN

B.

Proxy server

C.

IIS server

D.

VPN

Buy Now
Questions 18

Which of the following DNS records is used to identify a domain’s SMTP server?

Options:

A.

CNAME

B.

PTR

C.

MX

D.

A

Buy Now
Questions 19

A network technician is doing a wireless audit and finds an SSID that does not match the company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?

Options:

A.

AP isolation

B.

DDoS

C.

Evil twin

D.

Rogue AP

Buy Now
Questions 20

You have been tasked with testing a CAT5 cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the best results and select the options that explains the results.

Options:

Buy Now
Questions 21

During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?

Options:

A.

Wrong gateway

B.

Failed router

C.

Bad switch module

D.

Incorrect VLAN

Buy Now
Questions 22

A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?

Options:

A.

Reduce the power input on the replacement servers.

B.

Cover the servers with plastic tarps.

C.

Purchase twice as many servers to create high availability clusters.

D.

Transfer the replacement servers offsite to a data center.

Buy Now
Questions 23

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?

Options:

A.

Check for switching loops between core and distribution switches.

B.

Check whether an incorrect VLAN has been assigned to the new distribution switch.

C.

Check for inconsistent or missing routes between the core and distribution switches.

D.

Check whether the GBIC was set to multi-mode instead of single-mode SFP.

Buy Now
Questions 24

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

Options:

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Buy Now
Questions 25

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

Options:

A.

Decreasing radio strength

B.

MAC filtering

C.

WEP encryption

D.

SSID broadcast disable

Buy Now
Questions 26

A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO).

Options:

A.

20

B.

80

C.

143

D.

443

E.

8080

Buy Now
Questions 27

A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches?

Options:

A.

Turn down the signal strength

B.

Replace the WAP and enable WEP

C.

Change both the SSID and WEP key

D.

Enable WPA2 encryption

Buy Now
Questions 28

PKI is a method of user authentication which uses which of the following?

Options:

A.

Various router commands

B.

Access control lists

C.

Certificate services

D.

A RADIUS server

Buy Now
Questions 29

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?

Options:

A.

Managed

B.

Software

C.

Hardware

D.

Wireless

Buy Now
Questions 30

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

Options:

A.

Allow TCP port 23

B.

Allow TCP port 25

C.

Allow TCP port 110

D.

Allow UDP port 25

E.

Allow UDP port 110

Buy Now
Questions 31

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

Options:

A.

Man-in-the-middle

B.

Social engineering

C.

Phishing

D.

DoS

Buy Now
Questions 32

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

Options:

A.

PKI

B.

Kerberos

C.

Single sign-on

D.

CHAP

Buy Now
Questions 33

A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?

Options:

A.

EAP-LEAP

B.

MAC ACL

C.

EAP-TTLS

D.

MS-CHAPv2

Buy Now
Questions 34

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

Options:

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Buy Now
Questions 35

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?

Options:

A.

MDF

B.

VPN

C.

RDP

D.

IDF

Buy Now
Questions 36

Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of the following would be the NEXT step in the troubleshooting process?

Options:

A.

Implement the solution

B.

Establish a plan

C.

Document findings

D.

Escalate the issue

Buy Now
Questions 37

A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).

Options:

A.

Change the encryption method to WPA

B.

Limit the DHCP scope to only have three addresses total

C.

Enable the SSID broadcast

D.

Enable and configure MAC filtering

E.

Change the broadcast channel to a less commonly used channel

Buy Now
Questions 38

Which of the following would be the BEST solution for an IDS to monitor known attacks?

Options:

A.

Host-based

B.

Signature-based

C.

Network-based

D.

Behavior-based

Buy Now
Questions 39

Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to prevent switching loops?

Options:

A.

RIP

B.

OSPF

C.

STP

D.

EGP

Buy Now
Questions 40

The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following?

Options:

A.

MAC filtering

B.

Traffic shaping

C.

Session filtering

D.

IP filtering

Buy Now
Questions 41

MIMO technology in the 802.11n standard provides for which of the following benefits?

Options:

A.

Channel expansion

B.

Gigabit wireless bandwidth

C.

Multipath support

D.

Channel bonding

Buy Now
Questions 42

Which of the following is rated for speeds over 800Mbps?

Options:

A.

Coaxial

B.

DB-9

C.

CAT6

D.

CAT5e

Buy Now
Questions 43

Which of the following is used to filter outgoing network requests?

Options:

A.

Proxy server

B.

VPN concentrator

C.

DHCP server

D.

IIS server

Buy Now
Questions 44

An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?

Options:

A.

Packet filtering

B.

Spam filtering

C.

MAC filtering

D.

CSU

Buy Now
Questions 45

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Buy Now
Questions 46

Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?

Options:

A.

DNS

B.

NAT

C.

PKI

D.

RAS

Buy Now
Questions 47

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

Options:

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Buy Now
Questions 48

Lisa, an administrator, believes that the network has been attacked and there is no known definition or prevention method to help avoid this attack. Which of the following BEST describes this scenario?

Options:

A.

Zero day attack

B.

DDoS

C.

DoS

D.

SQL injection

Buy Now
Questions 49

Which of the following wireless security measures, although widely implemented, does not provide strong security?

Options:

A.

IPSec

B.

WPA2

C.

MAC address filtering

D.

802.1x

Buy Now
Questions 50

A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?

Options:

A.

Implement 802.11i on all switches in the network.

B.

Implement port security on all computers in the company.

C.

Implement port security on all switches in the network.

D.

Implement rules on the firewall to block unknown devices.

Buy Now
Questions 51

The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?

Options:

A.

PAT

B.

DHCP

C.

DMZ

D.

NAT

Buy Now
Questions 52

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

Options:

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

Buy Now
Questions 53

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

Options:

A.

Content filtering

B.

Port filtering

C.

MAC filtering

D.

IP filtering

Buy Now
Questions 54

Which of the following authentication solutions also provides AAA and uses TCP?

Options:

A.

TACACS+

B.

Kerberos

C.

RADIUS

D.

RAS

Buy Now
Questions 55

A technician tests a cable going to the patch panel and notices the following output from the cable tester:

1------------------1

2------------------2

3------------------3

4------------------4

5------------------5

6------------------6

7------------------7

8-- --8

On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue?

Options:

A.

White Orange

B.

Solid Brown

C.

Solid Orange

D.

White Green

Buy Now
Questions 56

A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use?

Options:

A.

Loopback plug

B.

Crimper tool

C.

Punch down tool

D.

Cable tester

Buy Now
Questions 57

Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?

Options:

A.

Cable tester

B.

Toner probe

C.

OTDR

D.

Loopback plug

Buy Now
Questions 58

A company wants to simplify network authentication for their users. Which of the following would be used to implement wireless security with single sign-on?

Options:

A.

WPA2 enterprise

B.

WEP

C.

Stateful firewall

D.

PAT

Buy Now
Questions 59

A network technician has a RADIUS server IP address that must be included as part of the security settings for a WAP. Which of the following encryption types should the technician select?

Options:

A.

WPA enterprise

B.

TKIP

C.

WPA2 CCMP

D.

WEP 128-bit

Buy Now
Questions 60

Which of the following wiring components is used as a central point of termination for all network jacks through a building area?

Options:

A.

Demarc

B.

CSU

C.

Patch Panel

D.

Smart Jack

Buy Now
Questions 61

Which of the following protocols provides a secure connection between two networks?

Options:

A.

L2TP

B.

IPSec

C.

PPP

D.

PPTP

Buy Now
Questions 62

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?

Options:

A.

Configure Wi-Fi Multimedia support

B.

Use only 20 MHz channel bandwidth

C.

Enable band steering to use 802.11n

D.

Configure Quality of Service

Buy Now
Questions 63

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

Options:

A.

Telnet

B.

FTP

C.

SNMP

D.

SSH

E.

RDP

Buy Now
Questions 64

Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?

Options:

A.

Non-Plenum CAT5

B.

Non-Plenum CAT5e

C.

Plenum CAT5

D.

Plenum CAT5e

Buy Now
Questions 65

When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?

Options:

A.

Implement multiple wireless encryption techniques.

B.

Implement PoE on each WAP.

C.

Decrease signal strength.

D.

Increase signal strength.

Buy Now
Questions 66

Which of the following IP addresses would be classified as private?

Options:

A.

10.100.200.0

B.

169.253.10.20

C.

172.168.5.0

D.

200.100.25.0

Buy Now
Questions 67

A technician is setting up a firewall on the network that would show a public IP address out to the Internet and assign private IP addresses to users inside the network. Which of the following processes should be set up?

Options:

A.

Port security

B.

MAC filtering

C.

ACL

D.

NAT

Buy Now
Questions 68

Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

GBIC

C.

MT-RJ

D.

SC

Buy Now
Questions 69

Which of the following defines an IP address that is NOT routed on the Internet?

Options:

A.

Multicast

B.

Public

C.

Private

D.

Classful

Buy Now
Questions 70

A technician has resolved a ticket to fix a user’s printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?

Options:

A.

Document findings and outcomes

B.

Establish a theory of probably cause

C.

Upgrade the printer drivers

D.

Close out the service ticket

Buy Now
Questions 71

Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

Options:

A.

This is a private address which cannot be seen by external users.

B.

The address does not have the appropriate subnet mask assigned.

C.

This is a public address which can only be seen by internal users.

D.

This is a private address which can only be seen by external users.

Buy Now
Questions 72

Which of the following OSI layers performs error detection using a Frame Check Sequence?

Options:

A.

Session

B.

Transport

C.

Physical

D.

Data link

Buy Now
Questions 73

Which of the following port numbers is used for SNMP?

Options:

A.

61

B.

151

C.

161

D.

1611

Buy Now
Questions 74

Standards such as JPEG and ASCII operate at which of the following OSI model layers?

Options:

A.

Presentation

B.

Data link

C.

Session

D.

Application

Buy Now
Questions 75

Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

Options:

A.

Transport services without error recovery

B.

Large data size manageability using segmentation

C.

Secure Kerberos password encryption on data

D.

Delivery through error recovery

E.

Proxy server authentication

Buy Now
Questions 76

Which of the following OSI layers BEST describes where an HTTP proxy operates?

Options:

A.

Transport

B.

Application

C.

Presentation

D.

Session

Buy Now
Questions 77

Joe, a technician, has identified a problem, established and confirmed a theory, and has attempted to resolve the problem. Joe, however, does not appear to have the rights to make the needed changes. Which of the following should he do NEXT?

Options:

A.

Re-establish a new theory.

B.

Gather more information.

C.

Establish a plan of action.

D.

Escalate the problem.

Buy Now
Questions 78

Which of the following exist at layer three of the OSI model? (Select TWO).

Options:

A.

NIC

B.

Switch

C.

Frame

D.

Packet

E.

Router

F.

Cable

Buy Now
Questions 79

Which of the following is an invalid MAC address?

Options:

A.

AA:CE:58:FD:90:08

B.

44:98:3E:F8:33:23

C.

56:AD:BX:89:55:54

D.

94:9E:FE:EE:8C:DF

Buy Now
Questions 80

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?

Options:

A.

Document findings

B.

Identify the problem

C.

Escalate the problem

D.

Establish a plan of action

Buy Now
Questions 81

A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT?

Options:

A.

Test the theory

B.

Question the user

C.

Document the outcome

D.

Verify functionality

Buy Now
Questions 82

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).

Options:

A.

UDP 53

B.

UDP 67

C.

UDP 68

D.

TCP 53

E.

TCP 67

F.

TCP 68

Buy Now
Questions 83

A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

Options:

A.

Session

B.

Application

C.

Network

D.

Physical

Buy Now
Questions 84

Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach’s theory?

Options:

A.

Traffic analysis

B.

SNMP

C.

History logs

D.

System logs

Buy Now
Questions 85

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?

Options:

A.

Load balancing

B.

Traffic policing

C.

Caching engines

D.

Traffic shaping

Buy Now
Questions 86

Which of the following network scanners detects and sends out alerts for malicious network activity?

Options:

A.

Packet sniffers

B.

IDS

C.

Port scanners

D.

IPS

Buy Now
Questions 87

Which of the following utilities would Karen, a technician, use to resolve the FQDN of a web server to its IP address?

Options:

A.

netstat

B.

route

C.

nslookup

D.

arp

Buy Now
Questions 88

Which of the following would Karen, a technician, do to monitor remote traffic through an access point?

Options:

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Buy Now
Questions 89

Sandy, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the network issue?

Options:

A.

ipconfig

B.

arp

C.

tracert

D.

netstat

Buy Now
Questions 90

Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?

Options:

A.

traceroute

B.

tracert

C.

ifconfig

D.

ipconfig

Buy Now
Questions 91

A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?

Options:

A.

Protocol analyzer

B.

ipconfig

C.

nslookup

D.

tracert

Buy Now
Questions 92

Which of the following should Kim, a technician, update when new computers are purchased?

Options:

A.

Asset management

B.

Change management

C.

Cable management

D.

Baselines

Buy Now
Questions 93

An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?

Options:

A.

Layer 3 managed switch

B.

VPN concentrator

C.

Load balancer

D.

Content filter

Buy Now
Questions 94

Which of the following is used to explain guidelines for users while using network resources?

Options:

A.

Network cut sheet

B.

Baselines

C.

Acceptable use policy

D.

Regulations

Buy Now
Questions 95

Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company’s T1 Internet access network. Which of the following optimizations should Lisa implement?

Options:

A.

Load balancing

B.

Caching engine

C.

Traffic shaping

D.

Quality of service

Buy Now
Questions 96

Which of the following regulates the amount of network traffic a single node receives in a server cluster?

Options:

A.

Load balancer

B.

Proxy server

C.

Content filter

D.

Quality of service

Buy Now
Questions 97

Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?

Options:

A.

Network intrusion detection

B.

Traffic analysis tool

C.

Syslog server

D.

Network sniffer

Buy Now
Questions 98

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

Options:

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Buy Now
Questions 99

Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

Options:

A.

Change management

B.

System logs

C.

Asset management

D.

Baselining

Buy Now
Questions 100

Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?

Options:

A.

OTDR

B.

Protocol analyzer

C.

Toner probe

D.

Cable certifier

Buy Now
Questions 101

Which of the following are standard fiber cable connector types? (Select TWO).

Options:

A.

RJ-11

B.

F-connector

C.

MTRJ

D.

DB-9

E.

ST

Buy Now
Questions 102

In the 2.4GHz range, which of the following channel combinations are non-overlapping?

Options:

A.

1, 6, 11

B.

2, 7, 10

C.

2, 8, 13

D.

3, 6, 9

Buy Now
Questions 103

Which of the following has the HIGHEST data rate speed?

Options:

A.

T1

B.

ADSL

C.

SDSL

D.

OC-3

Buy Now
Questions 104

Which of the following uses a ring topology?

Options:

A.

DSL

B.

Ethernet

C.

DOCSIS

D.

SONET

Buy Now
Questions 105

Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

Options:

A.

RJ-11

B.

BNC

C.

LC

D.

DB-9

Buy Now
Questions 106

Which of the following cable types is MOST commonly used with POTS?

Options:

A.

CAT3

B.

Multimode

C.

CAT6

D.

Coaxial

Buy Now
Questions 107

A network administrator tests a multimode fiber cable from end-to-end on a new link that is down and notices that the dB loss is -.09. Which of the following is the MOST likely cause?

Options:

A.

TXRX reversed

B.

dB loss too high

C.

dB loss too low

D.

Bad connectors

Buy Now
Questions 108

Which of the following connectors are MOST commonly used on a POTS line?

Options:

A.

RJ-45

B.

MTRJ

C.

DB-9

D.

RJ-11

Buy Now
Questions 109

Which of the following connectors would be found on a fiber optic cable?

Options:

A.

BNC

B.

RJ-11

C.

RS-232

D.

MTRJ

Buy Now
Questions 110

Which of the following supports faster wireless broadband speeds?

Options:

A.

Satellite

B.

WiMAX

C.

ISDN

D.

OC-3

Buy Now
Questions 111

Which of the following technologies is used on cellular networks?

Options:

A.

Ethernet

B.

CDMA

C.

CSMA/CA

D.

POTS

Buy Now
Questions 112

Users notice a problem with their network connectivity when additional lights are turned on. Which of the following would be the cause for this problem?

Options:

A.

DDOS

B.

Cross talk

C.

Open short

D.

EMI

Buy Now
Questions 113

Which of the following technologies can cause interference for 802.11g?

Options:

A.

RADAR

B.

802.11a

C.

IrDA

D.

Bluetooth

Buy Now
Questions 114

Which of the following WAN technologies has a MAXIMUM speed of 155.52Mbps?

Options:

A.

OC-3

B.

T3

C.

OC-12

D.

E1

Buy Now
Questions 115

Sandy, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 116

Which of the following is an example of a CSMA/CD medium?

Options:

A.

WEP

B.

SONET

C.

Token ring

D.

Ethernet

Buy Now
Questions 117

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

Options:

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Buy Now
Questions 118

Which of the following are standard fiber cable connector types? (Select TWO).

Options:

A.

RJ-11

B.

F-connector

C.

MTRJ

D.

DB-9

E.

ST

Buy Now
Questions 119

When examining a suspected faulty copper network cable, Kim, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

Options:

A.

DB loss

B.

Dispersion

C.

Collisions

D.

Cross-talk

Buy Now
Questions 120

Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use?

Options:

A.

CAT5e

B.

CAT6

C.

Coaxial

D.

Multimode fiber

Buy Now
Exam Code: JK0-023
Exam Name: CompTIA Network+ certification
Last Update: Dec 22, 2024
Questions: 1112