JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 2

Refer to the following wireless standards, which permits increased bandwidth through channel bonding? 


Options are :

  • 802.11g
  • 802.11n (Correct)
  • 802.11b
  • 802.11a

Answer : 802.11n

What is required for segmenting a large network? 


Options are :

  • Sub netting (Correct)
  • DHCP
  • Switches
  • Gateways

Answer : Sub netting

A VoIP system has just been deployed in your network. However, calls are discarded during busy times. What should be used to achieve this task? 


Options are :

  • QoS (Correct)
  • Fault tolerance
  • Load balancing
  • SSL VPN

Answer : QoS

Select a software from the following to monitor the network traffic at the frame level. 


Options are :

  • Load testing
  • Throughput testing
  • Packet sniffer (Correct)
  • Throughput testing

Answer : Packet sniffer

Many users complain of not being able to connect to a specific website. Which action should the network manager take FIRST? 


Options are :

  • Check event log each workstation
  • Check the firewall logs. (Correct)
  • Disable content filtering.
  • Capture packets from a workstation

Answer : Check the firewall logs.

Which protocol uses a flexible addressing system that makes it easier in building large-scale, heterogeneousnetworks? 


Options are :

  • AppleTalk
  • NetBEUI
  • TCP / IP (Correct)
  • ICMP

Answer : TCP / IP

Which of the following statements is FALSE? 


Options are :

  • A public IP address is required for users on a private network to access resources on the Internet.
  • Private IP addresses may not be duplicated (Correct)
  • Private IP addresses allow more that one private IP network to have the same IP address.
  • Public IP addresses are regulated by the American Registry for Internet Numbers (ARIN).

Answer : Private IP addresses may not be duplicated

Which type of wireless encryption is the best? 


Options are :

  • TKIP
  • RADIUS
  • AES (Correct)
  • WEP

Answer : AES

Fiber optic cables will be used in gigabit Ethernet. Gigabit Ethernet has which forms? (Select THREE).

A. 1000Base-CX

B. 10Base-T

C. 1000Base-SX

D. 1000Base-LX 


Options are :

  • A,C,D (Correct)
  • B,C,D
  • A,B,D
  • A,B,C

Answer : A,C,D

If you want to limit communication between network devices, which option below is applicable? 


Options are :

  • ACL (Correct)
  • NAT
  • CIDR
  • DHCP

Answer : ACL

In order to manage a web server, which service is used on a Windows network operating system? 


Options are :

  • IIS (Correct)
  • HTTP
  • XML
  • NET

Answer : IIS

A Windows user wants to access a share hosted on a Mac OS X server, but the server is not visible on the network. What must the network administrator enable on the Mac OS X server to allow Windows users to connect to shares? 


Options are :

  • DHCP (Dynamic Host Configuration Protocol)
  • VPN (Virtual Private Network)
  • AFP (Apple File Protocol)
  • Windows file and print sharing (Correct)

Answer : Windows file and print sharing

The maximum segment range of a 100Base-FX network is: 


Options are :

  • 2,000 meters (6,561 feet) (Correct)
  • 100 meters (328 feet)
  • 1,023 meters (3,356 feet)
  • 1,024 meters (3,359 feet)

Answer : 2,000 meters (6,561 feet)

Refer to the following devices, which one works at the OSI physical layer? 


Options are :

  • Switch
  • Bridge
  • Hub (Correct)
  • Router

Answer : Hub

Comparing the following Ethernet technologies, then select one with the shortest transmission distance. 


Options are :

  • 10GBase-T (Correct)
  • 10GBase-SR
  • 10Base-T
  • 100Base-T

Answer : 10GBase-T

The maximum range of 10GBase-SR is which of the following?   


Options are :

  • 1000 feet (305 meters)
  • 328 feet (100 meters)
  • 990 feet (302 meters) (Correct)
  • 6 miles (1593 kilometers)

Answer : 990 feet (302 meters)

Your company has just deployed three access points to cover the whole wing of the building. Each access point has a wired connection and the wireless transmission uses 802.11g. Which channel is for the access points? 


Options are :

  • Channels 2-4-6
  • Channels 1-6-11 (Correct)
  • Channels 7-11-1
  • Channels 1-3-5

Answer : Channels 1-6-11

Which terms is correct about the method used when a group of people, such as customers or suppliers, are permitted to pass through the firewall and access authorized sections of the network? 


Options are :

  • Intranet
  • VLAN
  • Extranet (Correct)
  • Internet

Answer : Extranet

As a network administrator, you must configure channels on which network equipment?   


Options are :

  • Wireless access point (Correct)
  • Firewall
  • Hub
  • Unmanaged switch

Answer : Wireless access point

NIC is short for Network Interface Card. Which item below is applicable to testing the NIC operation? 


Options are :

  • 568B
  • Rollover
  • Loop back (Correct)
  • Crossover

Answer : Loop back

As a network technician, you are asked to move some established phones by moving the wire connection at the termination block. Which tool needs to reconnect wires to the termination block? 


Options are :

  • Butt set
  • Punch down tool (Correct)
  • Cable stripper
  • Snips

Answer : Punch down tool

Which type of cable can connect two switches in two different wiring closets? 


Options are :

  • Loopback
  • Rollover
  • Crossover (Correct)
  • 568A

Answer : Crossover

Which routing protocol can load balance across unequal paths? 


Options are :

  • OSPF
  • RIPv2
  • RIP
  • EIGRP (Correct)

Answer : EIGRP

Which item below should be configured to improve network performance? 


Options are :

  • Caching engine (Correct)
  • Load balancing
  • Traffic shaping
  • Firewall

Answer : Caching engine

Select one remote access solution from the following to permit the least connection overhead. 


Options are :

  • SSL VPN (Correct)
  • L2TP VPN
  • PPTP VPN
  • IPSec VPN

Answer : SSL VPN

Select two IEEE designations used for the spanning tree protocol.(Select TWO).

A. 802.1n

B. 802.1w

C. 802.1p

D. 802.1d 


Options are :

  • C,D
  • A,C
  • B,D (Correct)
  • A,B

Answer : B,D

A customer who has built Internet connectivity is unable to use VPN to connect to the office. Which action will be taken next to troubleshoot? 


Options are :

  • Power cycle the VPN concentrator at the office.
  • Reinstall the VPN client at the remote computer.
  • Determine if the VPN service is running at the office
  • Determine if the user has the correct VPN address and password. (Correct)

Answer : Determine if the user has the correct VPN address and password.

Should a break occur in the cable of an Ethernet network, ______ will be offline. 


Options are :

  • the hosts upstream from the failed cable
  • the host directly connected to the failed cable (Correct)
  • all hosts on the network
  • none of the hosts on the network

Answer : the host directly connected to the failed cable

In a star topology, a central device connects all the devices on the network. What is the central device? 


Options are :

  • router
  • hub (Correct)
  • repeater
  • gateway

Answer : hub

The current wireless infrastructure has just deployed new wireless access points. WPA 2 is the security policy. Which encryption method is compatible with the previous deployed access points? 


Options are :

  • 3DES
  • TKIP
  • AES (Correct)
  • CHAP

Answer : AES

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions