JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 12

A workstation presents an error message to a user. The message states that "Duplicate IP (Internet Protocol) has been detected on the network." After establishing what has changed in the network, what should be the NEXT step using the standard troubleshooting model? 


Options are :

  • Document the solution and process
  • Select the most probable cause (Correct)
  • Implement an action plan
  • Test the result

Answer : Select the most probable cause

Which of the following can assure the security of data transmission via an IP network? 


Options are :

  • Telnet
  • TLS (Correct)
  • SIP
  • FTP

Answer : TLS

A remote user cannot use the URL http://mine.mypage.info to access the secure web server. The page is functional from other computers. The reason is that the user: 


Options are :

  • does not have access to .info domains
  • has the wrong browser version.
  • has not entered https (Correct)
  • has not entered www

Answer : has not entered https

A fully qualified domain name (FQDN), sometimes referred to as an absolute domain name, is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). On a network, the DNS services are in failed state, several customers want to access specific services using FQDN, which of the following is the best solution?   


Options are :

  • create a local host file on the PC. (Correct)
  • change the IP address of the specific services needed
  • change all domain relationships to WINS.
  • release and renew DHCP

Answer : create a local host file on the PC.

Assume that you are a network technician, a remote customer is complaining about the disconnection to a new VPN. What will you do? 


Options are :

  • Document the solution and process
  • Establish what haschanged
  • Implement an action plan
  • Identify the symptoms and potential causes (Correct)

Answer : Identify the symptoms and potential causes

You are the network assistant at certways.com. The network technician is troubleshooting a network connectivity problem. He asks you to determine the most probable cause of the problem. Which of the following would you need to do?(Choose all that apply)

A. Identify the symptoms.

B. Identify the affected area.

C. Identify what has changed.

D. Implement a solution.   


Options are :

  • A,C,D
  • A,B,D
  • B,C,D
  • A,B,C (Correct)

Answer : A,B,C

Which action will you take first if remote customers can't access files from a file server?   


Options are :

  • Network resources
  • Connectivity (Correct)
  • User accounts
  • Access rights

Answer : Connectivity

Which term best describes a server that can be configured to block connections according to the static address of a computer?   


Options are :

  • Kerberos
  • MAC address filtering
  • IP address filtering (Correct)
  • RADIUS

Answer : IP address filtering

Multimode fiber-optic cable is used in ______. 


Options are :

  • 10GBase - SR (Correct)
  • 10GBase-LR
  • 10GBase-ER
  • 1000Base-CX

Answer : 10GBase - SR

Which network device connects to a Telco T1 line at the boundary point? 


Options are :

  • CSU / DSU (Correct)
  • NIC
  • Modem
  • ISDN adapter

Answer : CSU / DSU

Your company wants to deploy a network with 30Mbps at the lowest cost. Which type of cable can help you achieve this goal?   


Options are :

  • CAT1
  • CAT6
  • CAT3
  • CAT5e (Correct)

Answer : CAT5e

Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point-to-Point connections. On wireless networks, EAP expands onauthentication methods used by which of the following?   


Options are :

  • HTTPS
  • SSH
  • SCP
  • PPP (Correct)

Answer : PPP

How many wires can be fit into RJ-11 connector at most? 


Options are :

  • 2
  • 4 (Correct)
  • 6
  • 8

Answer : 4

Which of the following statements regarding FDDI (Fiber Distributed Data Interface) is TRUE? 


Options are :

  • FDDI consists of two counter rotating token rings. (Correct)
  • FDDI has a maximum transmission distance of 1,000 meters.
  • FDDI has a maximum transmission speed of 54 Mbps
  • FDDI uses CSMA / CD (Carrier Sense Multiple Access / Collision Detection) for media access control

Answer : FDDI consists of two counter rotating token rings.

Use a hub to share files on a network can be achieved through which pair of IPv4 addresses? 


Options are :

  • 10.254.2.220/16 and 10.254.2.222/16 (Correct)
  • 10.192.2.220/16 and 10.254.2.222/16
  • 10.254.2.220/16 and 10.254.2.222/24
  • 10.192.2.220/16 and 10.254.2.222/16

Answer : 10.254.2.220/16 and 10.254.2.222/16

On the Windows proxy server 10.1.1.7, latency happens every morning, in order to identify how serious the latency is, which of the following can be used?   


Options are :

  • arp -t 10.1.1.7
  • ping -t 10.1.1.7 (Correct)
  • nbtstat -t 10.1.1.7
  • tracert -t 10.1.1.7

Answer : ping -t 10.1.1.7

Users want to connect to Internet without attaching to the company server. Workers of this company also want to connect to the company server and Internet. All connections are controlled by the same switch. What needs must be satisfied? 


Options are :

  • RIP
  • Porttrunking
  • OSPF
  • VLAN (Correct)

Answer : VLAN

Which statement best describes VLANs? 


Options are :

  • VLAN broadcasts are limited to the switch.
  • VLANs help isolate network traffic. (Correct)
  • VLANs help prevent overlapping.
  • VLANs create physical segments.

Answer : VLANs help isolate network traffic.

Assume that you are a network administrator, you are asked to deploy a small wireless network toauthenticate each user with encrypted usernames and passwords. Which technology will be of help to you? 


Options are :

  • WPA PEAP (Correct)
  • WPA TLS
  • 64-bit WEP
  • 128-bit WEP

Answer : WPA PEAP

Which of the following can be used to inspect network traffic? 


Options are :

  • Nbtstat
  • Network monitor (Correct)
  • Tracert
  • NWLink

Answer : Network monitor

In telecommunications and software engineering, scalability is a desirable property of a system, a network, or a process, which indicates its ability to either handle growing amounts of work in a graceful manner, or to be readily enlarged. Which topology is used in network due to its scalability? 


Options are :

  • Bus
  • Mesh
  • Ring
  • Star (Correct)

Answer : Star

How many broadcast domains are created by a 24 port switch configured with 12 VLANs with all of the ports being actively used? 


Options are :

  • 2
  • 12 (Correct)
  • 36
  • 24

Answer : 12

Which of the following operates at a maximum of 16 Mbps?   


Options are :

  • 10Base-T
  • 10GBase-SR
  • FDDI
  • Token Ring (Correct)

Answer : Token Ring

According to the following presented information, can you tell me which of the following has been used? Tracing route to 172.30.0.78 over a maximum of 30 hops 1 <1 ms <1 ms172.30.0.78 


Options are :

  • tracert (Correct)
  • arp
  • ping
  • netstat

Answer : tracert

A customer complains that when there is a phone call at home, the wireless on his notebook computer will lost connection. What is the most likely cause of this issue? 


Options are :

  • The cordless phones are plugged into the RJ-11 jack
  • The cordless phones are5.8Ghz which interferes with wireless
  • The cordless phones are2.4Ghz which interferes with wireless (Correct)
  • The cordless phones are plugged into same outlet as the router

Answer : The cordless phones are2.4Ghz which interferes with wireless

Which document describes the coverage area of a wireless network in detail? 


Options are :

  • Baseline
  • Site survey (Correct)
  • Physical network diagram
  • Logical network diagram

Answer : Site survey

Given a device from outside the network, if you want to mask the IP address of this device, which of the following will you use?   


Options are :

  • NAT (Correct)
  • DNS
  • DHCP
  • WINS

Answer : NAT

Which layer of the OSI model routes data across segments?   


Options are :

  • Data Link
  • Session
  • Transport
  • Network (Correct)

Answer : Network

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. It works at which layer of the OSI model? 


Options are :

  • Network
  • Transport
  • Application (Correct)
  • Presentation

Answer : Application

One network technician is able to telnet the remote server of his company, however he is unable to connect to any other servers, but can ping them using an IP address. Why? 


Options are :

  • The server is on a different physical network.
  • DHCP is not correctly configured.
  • The server is on a different VLAN.
  • DNS is not correctly configured. (Correct)

Answer : DNS is not correctly configured.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions