Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestgeek

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 CompTIA Network+ certification Questions and Answers

Questions 4

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?

Options:

A.

An IP filtering ACL

B.

A MAC filtering ACL

C.

A port filtering ACL

D.

A class matching ACL

Buy Now
Questions 5

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel?

Options:

A.

Butt set

B.

Cable certifier

C.

Toner probe

D.

Snips

Buy Now
Questions 6

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

Options:

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

Buy Now
Questions 7

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?

Options:

A.

Check for switching loops between core and distribution switches.

B.

Check whether an incorrect VLAN has been assigned to the new distribution switch.

C.

Check for inconsistent or missing routes between the core and distribution switches.

D.

Check whether the GBIC was set to multi-mode instead of single-mode SFP.

Buy Now
Questions 8

Which of the following DNS records allows for reverse lookup of a domain?

Options:

A.

PTR

B.

AAAA

C.

A

D.

MX

Buy Now
Questions 9

Which of the following network protocols is used for a secure command line interface for management of network devices?

Options:

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Buy Now
Questions 10

In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).

Options:

A.

VLAN configuration error

B.

Cables too short

C.

Cable crosstalk

D.

Incorrect channel

E.

EMI

F.

Wrong subnet mask

Buy Now
Questions 11

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

Options:

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Buy Now
Questions 12

Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?

Options:

A.

Cable tester

B.

Punch down tool

C.

Crimper

D.

Multimeter

Buy Now
Questions 13

Which of the following protocols provides a secure connection between two networks?

Options:

A.

L2TP

B.

IPSec

C.

PPP

D.

PPTP

Buy Now
Questions 14

A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO).

Options:

A.

Toner probe

B.

Cable certifier

C.

Butt set

D.

Crimper

E.

Network analyzer

Buy Now
Questions 15

A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the following is the MOST likely problem?

Options:

A.

Faulty crossover cable

B.

DNS server is down

C.

Switching loop

D.

Outside interface shutdown

Buy Now
Questions 16

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).

Options:

A.

Cable certifier

B.

Ping command

C.

Punch down tool

D.

Crimper

E.

Toner probe

Buy Now
Questions 17

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

Options:

A.

Routing loop

B.

MTU black hole

C.

Framing errors

D.

SYN flood

Buy Now
Questions 18

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

Buy Now
Questions 19

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO).

Options:

A.

Layer 2 switch

B.

MAC address filtering

C.

ACLs

D.

IIS server

E.

Port scanner

F.

Firewall

Buy Now
Questions 20

Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?

Options:

A.

21

B.

22

C.

23

D.

25

Buy Now
Questions 21

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

Options:

A.

Man-in-the-middle

B.

Social engineering

C.

Phishing

D.

DoS

Buy Now
Questions 22

Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?

Options:

A.

TLS 1.2

B.

SNMPv3

C.

WPA2

D.

SMTP

Buy Now
Questions 23

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

Options:

A.

Decreasing radio strength

B.

MAC filtering

C.

WEP encryption

D.

SSID broadcast disable

Buy Now
Questions 24

Which of the following provides RSA encryption at the session layer?

Options:

A.

SSH

B.

ISAKMP

C.

SSL

D.

TLS

Buy Now
Questions 25

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

Options:

A.

Man-in-the-middle attack.

B.

Rogue access point.

C.

Evil twin.

D.

Packet sniffer.

Buy Now
Questions 26

Which of the following is used to determine whether or not a user’s account is authorized to access a server remotely?

Options:

A.

VPN

B.

RDP

C.

LDAP

D.

Encryption

Buy Now
Questions 27

Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

Options:

A.

PKI

B.

TACACS+

C.

CHAP

D.

SSH

Buy Now
Questions 28

Which of the following will prevent switching loops by selectively shutting down switch ports?

Options:

A.

RIP

B.

IGP

C.

STP

D.

VLAN

Buy Now
Questions 29

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

Options:

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Buy Now
Questions 30

The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?

Options:

A.

The installation exceeds the link limitations

B.

The antenna is mounted for vertical polarization

C.

The dBi output of the antenna is too low

D.

The radio is too powerful for the installation

Buy Now
Questions 31

Which of the following protocols is used by Windows to securely access a remote computer?

Options:

A.

RAS

B.

Telnet

C.

PPP

D.

RDP

Buy Now
Questions 32

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

Options:

A.

Content filtering

B.

Port filtering

C.

MAC filtering

D.

IP filtering

Buy Now
Questions 33

A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?

Options:

A.

Single sign-on

B.

Network access control

C.

PKI authentication

D.

Two-factor authentication

Buy Now
Questions 34

Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?

Options:

A.

Both T568A and T568B standards are being used.

B.

STP is disabled.

C.

The cable is not a crossover.

D.

The port is not trunked.

Buy Now
Questions 35

A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?

Options:

A.

802.11a with WPA2-Enterprise

B.

802.11n with WPA-PSK

C.

802.11n with WPA2-PSK

D.

802.11g with WPA-Enterprise

Buy Now
Questions 36

Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?

Options:

A.

Implement WEP encryption

B.

Decrease signal strength

C.

Change wireless channels

D.

Rotate the SSID daily

Buy Now
Questions 37

A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?

Options:

A.

Disable the SSID.

B.

Change the broadcast channel.

C.

Lower the signal strength.

D.

Change the antennas.

Buy Now
Questions 38

A company wants to simplify network authentication for their users. Which of the following would be used to implement wireless security with single sign-on?

Options:

A.

WPA2 enterprise

B.

WEP

C.

Stateful firewall

D.

PAT

Buy Now
Questions 39

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?

Options:

A.

net share

B.

hostname

C.

ipconfig

D.

tracert

Buy Now
Questions 40

A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).

Options:

A.

Preventing dictionary attacks on user passwords

B.

Reducing spam from outside email sources

C.

Shielding servers from attacks on internal services

D.

Blocking external probes for vulnerabilities

E.

Directing DNS queries to the primary server

Buy Now
Questions 41

The components of a NIC function at which of the following layers of the OSI model? (Select TWO).

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Buy Now
Questions 42

Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?

Options:

A.

DNS

B.

NAT

C.

PKI

D.

RAS

Buy Now
Questions 43

An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?

Options:

A.

Allow TCP port 3389 outbound

B.

Allow UDP port 3389 inbound

C.

Allow UDP port 3389 outbound

D.

Allow TCP port 3389 inbound

Buy Now
Questions 44

Which of the following would be used to place extranet servers in a separate subnet for security purposes?

Options:

A.

VPN

B.

NAT

C.

DMZ

D.

IDS

Buy Now
Questions 45

Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

Options:

A.

Device placement

B.

MAC address filtering

C.

User authentication

D.

Encryption protocols

Buy Now
Questions 46

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Buy Now
Questions 47

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

Options:

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

Buy Now
Questions 48

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

Options:

A.

PKI

B.

Kerberos

C.

Single sign-on

D.

CHAP

Buy Now
Questions 49

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?

Options:

A.

Port filtering

B.

WEP

C.

MAC address filtering

D.

PoE

Buy Now
Questions 50

Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?

Options:

A.

OTDR

B.

Protocol analyzer

C.

Toner probe

D.

Cable certifier

Buy Now
Questions 51

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

Options:

A.

Increased uptime

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Buy Now
Questions 52

Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used? (Select TWO).

Options:

A.

IDS

B.

Packet sniffer

C.

Port scanners

D.

Malware scanner

E.

Ping sweep

Buy Now
Questions 53

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

Options:

A.

Hub

B.

VLAN

C.

Router

D.

Server

Buy Now
Questions 54

Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?

Options:

A.

Network maps

B.

Cable management documentation

C.

Wire schemes

D.

Baseline

Buy Now
Questions 55

Which of the following would Karen, a technician, do to monitor remote traffic through an access point?

Options:

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Buy Now
Questions 56

An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?

Options:

A.

SNMPv3

B.

VTP

C.

CDP

D.

IPSec

Buy Now
Questions 57

Karen, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Karen?

Options:

A.

Web server

B.

Syslog

C.

Network sniffer

D.

SNMP

Buy Now
Questions 58

Which of the following would Sandy, a technician, find in a network map?

Options:

A.

QoS standards

B.

MDF/IDFs

C.

System logs

D.

Firewall rules

Buy Now
Questions 59

Which of the following is used to verify configuration updates on a firewall?

Options:

A.

Signature identification

B.

Access control lists

C.

Scanning services

D.

Content filtering

Buy Now
Questions 60

Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?

Options:

A.

DNS server

B.

Content filter

C.

Proxy server

D.

Load balancer

Buy Now
Questions 61

Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server?

Options:

A.

nbtstat

B.

ipconfig

C.

dig

D.

netstat

Buy Now
Questions 62

A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?

Options:

A.

Environmental monitor

B.

Multimeter

C.

Toner probe

D.

Protocol analyzer

Buy Now
Questions 63

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Buy Now
Questions 64

A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?

Options:

A.

arp

B.

nslookup

C.

ipconfig

D.

netstat

Buy Now
Questions 65

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?

Options:

A.

QoS

B.

CARP

C.

VLAN

D.

DHCP server

Buy Now
Questions 66

Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each device’s MIB. Which of the following should she use?

Options:

A.

SNMP

B.

Traffic analysis

C.

Syslog

D.

Asset management

Buy Now
Questions 67

A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?

Options:

A.

Traffic shaping

B.

QoS

C.

Caching engines

D.

High availability

Buy Now
Questions 68

Which of the following network devices hides network nodes behind one public IP address?

Options:

A.

Layer 3 switch

B.

Content filter

C.

VPN server

D.

Proxy server

Buy Now
Questions 69

A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?

Options:

A.

Caching

B.

Asset management

C.

Traffic shaping

D.

High availability

Buy Now
Questions 70

Which of the following is used to restrict access according to user policies?

Options:

A.

Content filter

B.

DHCP server

C.

DNS server

D.

VPN concentrator

Buy Now
Questions 71

Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?

Options:

A.

Multimeter

B.

OTDR

C.

Link state

D.

Protocol analyzer

Buy Now
Questions 72

Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted?

Options:

A.

Environmental monitor

B.

OTDR

C.

Cable tester

D.

Punch down tool

Buy Now
Questions 73

Which of the following cables covers the LONGEST distance?

Options:

A.

10GBaseT

B.

10GBaseFR

C.

100BaseTX

D.

1000BaseX

Buy Now
Questions 74

The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly?

Options:

A.

2

B.

4

C.

5

D.

8

Buy Now
Questions 75

Which of the following is similar to MIMO?

Options:

A.

WPA

B.

SSID

C.

PoE

D.

Diversity

Buy Now
Questions 76

802.11n can operate at which of the following frequencies? (Select TWO).

Options:

A.

2.4Mhz

B.

2.5Mhz

C.

5Mhz

D.

2.4Ghz

E.

2.5Ghz

F.

5Ghz

Buy Now
Questions 77

The unit responsible for the successful shaping and transmission of a digital signal is called:

Options:

A.

demarc.

B.

T1 hub.

C.

smart jack.

D.

CSU/DSU.

Buy Now
Questions 78

Which of the following is the FASTEST Ethernet technology?

Options:

A.

10GBaseSR

B.

10BaseT

C.

100BaseFX

D.

1000BaseT

Buy Now
Questions 79

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

Options:

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Buy Now
Questions 80

Which of the following connector types will MOST likely be located on a serial cable?

Options:

A.

DB-9

B.

LC

C.

ST

D.

BNC

Buy Now
Questions 81

Joe, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use?

Options:

A.

100BaseFX

B.

10GBaseT

C.

MPLS

D.

Coaxial

Buy Now
Questions 82

Which wireless standard works at a MAXIMUM data rate of up to 54Mbps?

Options:

A.

802.11b

B.

802.11g

C.

802.11n

D.

802.1q

Buy Now
Questions 83

In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?

Options:

A.

MIMO, DSSS

B.

MIMO, OFDM

C.

CSMA, DSSS

D.

CSMA, CDMA

Buy Now
Questions 84

Which of the following network topologies describes a network where each node is connected to multiple devices?

Options:

A.

Mesh

B.

Bus

C.

Star

D.

Ring

Buy Now
Questions 85

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?

Options:

A.

Improper grounding

B.

TXRX reversed

C.

Incorrect termination

D.

Outdated NIC drivers

Buy Now
Questions 86

Which of the following uses copper wiring?

Options:

A.

10GBaseER

B.

10GBaseLW

C.

100BaseFX

D.

1000BaseT

Buy Now
Questions 87

Which of the following cable types would have the LEAST amount of EMI?

Options:

A.

CAT3

B.

CAT5

C.

STP CAT6

D.

Plenum CAT6

Buy Now
Questions 88

Which of the following are standard fiber cable connector types? (Select TWO).

Options:

A.

RJ-11

B.

F-connector

C.

MTRJ

D.

DB-9

E.

ST

Buy Now
Questions 89

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

Options:

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Buy Now
Questions 90

Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?

Options:

A.

A 110 block

B.

A demarc

C.

A DB-9

D.

A smart jack

Buy Now
Questions 91

Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?

Options:

A.

Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.

B.

Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.

C.

Manually adjust the duplex mode on the server’s link.

D.

Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

Buy Now
Questions 92

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?

Options:

A.

Switch the channel

B.

Change frequencies

C.

Channel bonding

D.

Increase the signal

Buy Now
Questions 93

An 802.11b wireless network has a maximum data rate of:

Options:

A.

11 Mbps.

B.

20 Mbps.

C.

28 Mbps.

D.

54 Mbps.

Buy Now
Questions 94

Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?

Options:

A.

Dual frequency

B.

Enhanced encryption

C.

MIMO technology

D.

Backwards compatibility

Buy Now
Questions 95

Which of the following wireless standards is the only one capable of operating in either of the 802.11 wireless spectrums?

Options:

A.

A

B.

B

C.

G

D.

N

Buy Now
Questions 96

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:

End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

Which of the following should Kim do to complete the installation?

Options:

A.

Re-end the provided cable, keeping the wiring the same.

B.

Use the provided cable.

C.

Purchase a crossover cable.

D.

Purchase a straight-through cable.

Buy Now
Questions 97

A user reports that they are unable to connect to the network. Upon further investigation, a technician notices that the user has an IP address/subnet mask combination of 192.168.204.255/24. The default gateway for the network is 192.168.204.254. Which of the following could the user’s IP address be changed to so that they could connect to the network?

Options:

A.

192.168.204.0/27

B.

192.168.204.1/27

C.

192.168.204.112/24

D.

192.168.204.254/24

Buy Now
Questions 98

Which of the following protocols are used to provide accurate time to network devices?

Options:

A.

SMTP

B.

FTP

C.

TLS

D.

NTP

Buy Now
Questions 99

For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?

Options:

A.

The server contains several virtual machines and the MAC addresses are from the virtual machines.

B.

The server is hosting a web server and the MAC addresses are from connected browsers.

C.

The server is hosting a proxy server and the MAC addresses are from the connected clients.

D.

The server NIC is starting to fail and should be replaced.

Buy Now
Questions 100

Which of the following describes the amount of time it takes for a packet to transmit from one switch to another?

Options:

A.

Hop count

B.

Latency

C.

MTU limit

D.

Distance vector

Buy Now
Questions 101

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).

Options:

A.

UDP 53

B.

UDP 67

C.

UDP 68

D.

TCP 53

E.

TCP 67

F.

TCP 68

Buy Now
Questions 102

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?

Options:

A.

Document findings

B.

Identify the problem

C.

Escalate the problem

D.

Establish a plan of action

Buy Now
Questions 103

Which of the following protocols is the BEST choice for retrieving email on multiple devices?

Options:

A.

IMAP4

B.

SMTP

C.

FTP

D.

SNMPv3

Buy Now
Questions 104

The TCP/IP application layer contains which of the following OSI layers?

Options:

A.

Layers 1,5,6,7

B.

Layers 4,7

C.

Layers 5,6,7

D.

Layer 7

Buy Now
Questions 105

The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Buy Now
Questions 106

Which of the following assists a network administrator in reverse engineering malware and viruses?

Options:

A.

Virtual switches

B.

Virtual machines

C.

VLANs

D.

IDS

Buy Now
Questions 107

Which protocol is represented by the packet capture below?

UDP 0.0.0.0:68 -> 255.255.255.255:67

Options:

A.

DHCP

B.

FTP

C.

SNMP

D.

DNS

Buy Now
Questions 108

Which of the following DNS records would allow for a website to have more than one FQDN?

Options:

A.

TXT

B.

PTR

C.

MX

D.

CNAME

Buy Now
Questions 109

Which of the following TCP/IP model layers combines four OSI model layers?

Options:

A.

Application Layer

B.

Internet Layer

C.

Transport Layer

D.

Network Interface Layer

Buy Now
Questions 110

The MAC address of a network device is used to communicate at which of the following OSI layers?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 5

Buy Now
Questions 111

Which IEEE protocol is used with VLAN technology?

Options:

A.

802.11a

B.

802.11b

C.

802.1m

D.

802.1q

Buy Now
Questions 112

Which of the following DNS record types will be used for mail transfer if the MX record is not found?

Options:

A.

CNAME

B.

A

C.

PTR

D.

AAAA

Buy Now
Questions 113

Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?

Options:

A.

The transport OSI model layer and the transport TCP/IP model layer.

B.

The transport OSI model layer and the Internet TCP/IP model layer.

C.

The network OSI model layer and the transport TCP/IP model layer.

D.

The network OSI model layer and the Internet TCP/IP model layer.

Buy Now
Questions 114

Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

Options:

A.

Transport services without error recovery

B.

Large data size manageability using segmentation

C.

Secure Kerberos password encryption on data

D.

Delivery through error recovery

E.

Proxy server authentication

Buy Now
Questions 115

An IP address is encapsulated at which of the following layers of the OSI model?

Options:

A.

Transport

B.

Data link

C.

Network

D.

Application

Buy Now
Questions 116

Frames are the Protocol Data Unit for which of the following layers of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Buy Now
Questions 117

Kurt, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Kurt’s NEXT step?

Options:

A.

Test the theory

B.

Establish a plan of action

C.

Establish a theory

D.

Document findings

Buy Now
Questions 118

The BEST way to determine the next hop of a packet is to check the:

Options:

A.

link state

B.

routing table

C.

routing metrics

D.

convergence

Buy Now
Questions 119

Which of the following is a purpose of a VLAN?

Options:

A.

Decreases bandwidth on a network

B.

Segments broadcast traffic

C.

Increases port speed

D.

Allows another connection to the router

Buy Now
Questions 120

Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?

Options:

A.

CNAME

B.

A

C.

MX

D.

PTR

Buy Now
Exam Code: JK0-023
Exam Name: CompTIA Network+ certification
Last Update: Apr 14, 2023
Questions: 1112