JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 1

Modal distortion is a problem with which type of media? 


Options are :

  • Fiber optic cable (Correct)
  • UTP (Unshielded Twisted Pair)
  • Coaxial cable
  • STP (Shielded Twisted Pair)

Answer : Fiber optic cable

After plugging a host into a switch port, a user discovers that he can??t visit server resources on the network. Why? (Select TWO).

A. The computer is connected to an incorrectPoE port.

B. The appropriate credentials have not been supplied for network access.

C. The spanning tree protocol has locked down the port.

D. The computer is connected to a port in the wrong VLAN.   


Options are :

  • B,D (Correct)
  • A,B
  • A,C
  • C,D

Answer : B,D

Network topology is the study of the arrangement or mapping of the elements of a network. In the Star-Ring topology, the computers are connected to a central component as in a star network. Choose one item that can be used by star ring topology to transfer data. 


Options are :

  • CSMA/CA
  • Token passing (Correct)
  • CHAP
  • CSMA/CD

Answer : Token passing

Which of the following is not provided by a DHCP server? 


Options are :

  • Automatic configuration of MAC address. (Correct)
  • The IP address of the preferred DNS server.
  • The IP address of the preferred WINS server.
  • Automatic configuration of IP address, subnet mask and default gateway

Answer : Automatic configuration of MAC address.

A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal? 


Options are :

  • Data is backed up on tape and stored at an offsite location.
  • An exact duplicate of the infrastructure is storedonsite.An exact duplicate of the infrastructure is mirrored offsite.
  • Data is backed up on a second hard drive in a server.
  • An exact duplicate of the infrastructure is mirrored offsite. (Correct)

Answer : An exact duplicate of the infrastructure is mirrored offsite.

Select a network component to proactively diagnose and fix security attacks. 


Options are :

  • VPN
  • SSL
  • IDS
  • IPS (Correct)

Answer : IPS

NetBIOS is an acronym for Network Basic Input/Output System. A network administrator adds a router to create a new subnet. Which network service requires configuration to accommodate NetBIOS on the new network? 


Options are :

  • Windows Internet Name Service (WINS) (Correct)
  • Dynamic Host Configuration Protocol (DHCP)
  • Network News Transport Protocol (NNTP)
  • Network Time Protocol (NTP)

Answer : Windows Internet Name Service (WINS)

Your company's building has many floors. You are asked to install a wireless network in this building, what should be taken into consideration? 


Options are :

  • Channel overlap (Correct)
  • SSID naming
  • Encryption algorithm
  • Frequency configuration

Answer : Channel overlap

Which tool below is used for checking the speed and condition of a cable signal? 


Options are :

  • Protocol analyzer
  • Voltage event recorder
  • TDR (Correct)
  • Toner probe

Answer : TDR

Which of the following are NOT valid reasons for implementing subnetting?

A. To increase the number of hosts a Class A network address can support.

B. To minimize network traffic and reduce network congestion.

C. To optimized the use of the IP address space.

D. To break up a large network.   


Options are :

  • B,C
  • C,D
  • A,D (Correct)
  • A,B

Answer : A,D

Charles is a network technician of his company. He discovers that many workstations can't connect to the network, but he is unable to identify the reason. In order to solve this problem, what advice will you give? 


Options are :

  • Determine if anything has changed
  • Escalate the issue to a senior network associate. (Correct)
  • Document all possible causes
  • Reboot the computer to try and recreate the issue.

Answer : Escalate the issue to a senior network associate.

Which mechanism is used by a DHCP server to track which IP address is assigned to a particular computer? 


Options are :

  • DNS
  • WINS
  • FQDN
  • MAC address (Correct)

Answer : MAC address

AS-Path can be used by which protocol to create the routing table? 


Options are :

  • BGP (Correct)
  • OSPF
  • EIGRP
  • IS-IS

Answer : BGP

Look at the following protocols carefully, which one will permit automated alerts and reports on network devices? 


Options are :

  • SNMP (Correct)
  • SMTP
  • IGMP
  • TLS

Answer : SNMP

If you want communication to be performed at both 2.4GHz and 5GHz frequencies, which wireless communication standard will you use? 


Options are :

  • 802.11b
  • 802.11g
  • 802.11n (Correct)
  • 802.11a

Answer : 802.11n

As a network technician, you are responsible for maintaining a network router. How to temporarily re-route traffic through another office? 


Options are :

  • Implement steady state convergence.
  • Configure EGP
  • Configure a static route (Correct)
  • Implement NAT on the server.

Answer : Configure a static route

Your customer is complaining about the decreased signal strength on the wireless connection. This does not happen before and the network configuration remains the same. What is the source of this issue? 


Options are :

  • Incorrect encryption
  • Incorrect SSID
  • Standards mismatch
  • Environmental factors (Correct)

Answer : Environmental factors

When attaching to a Windows network resource, credentials are supplied through the use of a: 


Options are :

  • cookie
  • cache
  • token (Correct)
  • key file.

Answer : token

Which protocol will permit a user to simulate being at their office computer from home? 


Options are :

  • RDP (Correct)
  • VPN
  • SLIP
  • RAS

Answer : RDP

Look at the following options, which two can identify whether a machine uses the correct DNS server? (Select TWO).

A. tracert

B. netstat

C. ifconfig

D. ipconfig 


Options are :

  • A,B
  • C,D (Correct)
  • B,D
  • A,C

Answer : C,D

Which of the following can be used to cache web pages for future retrieval? 


Options are :

  • Web server
  • Switch
  • Proxy service (Correct)
  • Repeater

Answer : Proxy service

Which protocol can help transfer files to a network device safely? 


Options are :

  • FTP
  • TFTP
  • SNMPv2
  • SCP (Correct)

Answer : SCP

If you want to send the encrypted login credentials over the network, which protocol will be used? 


Options are :

  • Telnet
  • SSH (Correct)
  • FTP
  • HTTP

Answer : SSH

Given that one network shares its office space with another, and both the networks have an 802.11g access point. What can prevent mutual interference? 


Options are :

  • Channel (Correct)
  • Pre-shared key
  • WEP key
  • Encryption type

Answer : Channel

Your company has just deployed three access points to cover the whole wing of the building. Only one access point has a wired connection and the wireless transmission uses 802.11g. Which channel is for the access points?   


Options are :

  • Channels 1-3-5
  • Channels 6-6-6 (Correct)
  • Channels 7-11-1
  • Channels 5-5-5

Answer : Channels 6-6-6

Refer to the following tools, which one can verify the available phone numbers at a telecommunication block? 


Options are :

  • Multimeter
  • Punch down tool
  • Toner probe
  • Butt set (Correct)

Answer : Butt set

Which of the following will reduce DHCP traffic on a network? 


Options are :

  • Increasing the lease expiration time on the DHCP server. (Correct)
  • Decreasing the lease expiration time on all DHCP clients.
  • Increasing the lease expiration time on all DHCP clients
  • Decreasing the lease expiration time on the DHCP server

Answer : Increasing the lease expiration time on the DHCP server.

A workstation can't connect to the network due to a trouble ticket. Which step will be taken first? 


Options are :

  • Check switches.
  • Check gateway.
  • Gather information. (Correct)
  • Escalate the issue.

Answer : Gather information.

Which network device should be installed to connect a fiber NIC to an Ethernet backbone? 


Options are :

  • Media converter (Correct)
  • Repeater
  • Bridge
  • Hub

Answer : Media converter

A proxy server is also called:   


Options are :

  • remote access server.
  • virtual server
  • caching server (Correct)
  • domain controller.

Answer : caching server

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions