JK0-019 CompTIA E2C Network + Certification Exam Set 2

After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).

A. Bad Ethernet switch port

B. TX/RX reversed

C. Bad connectors

D. Bad patch cable

E.   Mismatched MTU 


Options are :

  • C,D (Correct)
  • A,B
  • B,D
  • A,E

Answer : C,D

A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).

A. That there is strong encryption enabled and configured on the access point.

B. The user’s home network has a correctly completed WHOIS entry.

C. The access point is broadcasting the SSID based upon manufacturer’s standards.

D. There are no conflicts of channels in use by neighboring wireless networks.

E. There are redundant internal DNS names set in the access point’s settings.

F. That the access point’s MAC address is properly set in its configuration settings.     


Options are :

  • A,B
  • C,E
  • A,D (Correct)
  • B,F

Answer : A,D

Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?

Building ABuilding BBuilding C

Channel: 2Channel: 6Channel: 11

Encryption: WPA2Encryption: WPA2Encryption: WPA2 


Options are :

  • Channel set to 11 in Building B
  • Encryption set to Open in Building B (Correct)
  • Encryption set to Open in all Buildings
  • Encryption set to WEP in Building B

Answer : Encryption set to Open in Building B

A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended? 


Options are :

  • Change the encryption method to be unique for each WAP.
  • Change the SSID to be unique for each WAP.
  • Change the antenna direction to be unique for each WAP.
  • Change the channel to be unique for each WAP. (Correct)

Answer : Change the channel to be unique for each WAP.

Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?   


Options are :

  • Gateways
  • Leases
  • Suffixes
  • Reservations (Correct)

Answer : Reservations

A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs? 


Options are :

  • Bonding
  • Trunking (Correct)
  • Authenticating
  • Mirroring

Answer : Trunking

Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings? 

Building ABuilding BBuilding C

Channel: 1Channel: 6Channel: 11

Encryption: WPA2Encryption: OpenEncryption: WPA2

SSID. CorpSSID. GuestSSID. Sales   


Options are :

  • Change SSID in Building C to match Building A (Correct)
  • Change Encryption in Building B to match A and C
  • Change Channel in Building C to 1
  • Change Channel in Building B to 7

Answer : Change SSID in Building C to match Building A

A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches?   


Options are :

  • Replace the WAP and enable WEP
  • Turn down the signal strength
  • Change both the SSID and WEP key
  • Enable WPA2 encryption (Correct)

Answer : Enable WPA2 encryption

A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT? 


Options are :

  • Close and document the service call, as there was no actual issue affecting the users.
  • Power-cycle the switch that the users share to clear out cached DNS records.
  • Ask the users for more information, such as which applications were not functioning. (Correct)
  • Escalate the issue to the network administrator to have their domain credentials reset.

Answer : Ask the users for more information, such as which applications were not functioning.

A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?   


Options are :

  • Port security
  • VLAN settings
  • Patch cable (Correct)
  • History logs

Answer : Patch cable

After deploying a network switch, the network administrator is unable to remotely administer the device. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue?

Management LAN: 192.168.10.0/24

Management interfacE. 192.168.10.2 255.255.255.0

Default gateway: 192.168.11.1

STP is enabled   


Options are :

  • VLAN assignment
  • Wrong subnet mask
  • Wrong gateway (Correct)
  • Switching loop

Answer : Wrong gateway

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a: 


Options are :

  • packet sniffer
  • evil twin
  • rogue access point (Correct)
  • man-in-the-middle attack

Answer : rogue access point

During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?   


Options are :

  • Incorrect VLAN
  • Bad switch module
  • Failed router (Correct)
  • Wrong gateway

Answer : Failed router

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take? 


Options are :

  • Establish a plan of action
  • Document findings
  • Escalate the problem (Correct)
  • Identify the problem

Answer : Escalate the problem

A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this? 


Options are :

  • Change the broadcast channel.
  • Disable the SSID.
  • Change the antennas. (Correct)
  • Lower the signal strength.

Answer : Change the antennas.

Which of the following would allow for a specific device to receive the same IP address from a DHCP server?   


Options are :

  • Scope
  • Reservation (Correct)
  • Suffix
  • Lease

Answer : Reservation

When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?   


Options are :

  • STP
  • 802.1q (Correct)
  • Collision avoidance
  • Port mirroring

Answer : 802.1q

Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns? 


Options are :

  • Alter the domain account login policies to reflect the most common application rule sets.
  • Increase the time between mandatory password changes by a factor of three.
  • Implement a software solution that facilitates single sign-on authentication. (Correct)
  • Ensure that the user accounts are properly configured in domain services

Answer : Implement a software solution that facilitates single sign-on authentication.

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?   


Options are :

  • Set up encryption on the WAP and clients (Correct)
  • Change the device placement to further obfuscate the signal
  • Change the wireless channel on the WAP
  • Decrease signal strength on the antenna

Answer : Set up encryption on the WAP and clients

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed? 


Options are :

  • The number of allowable MAC addresses. (Correct)
  • The network address translation IP range.
  • The signal strength of the router
  • The DCHP lease time.

Answer : The number of allowable MAC addresses.

A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?   


Options are :

  • SSID mismatch (Correct)
  • Antenna placement
  • Incorrect WPA key
  • Signal bounce

Answer : SSID mismatch

A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause? 


Options are :

  • Signal strength
  • Interference
  • AP placement
  • Incorrect SSID (Correct)

Answer : Incorrect SSID

A technician would like to connect two separate LAN networks at a small business for a short period of time, to share files. The connection needs to be temporary, and is physically impossible using standard network cabling. Which of the following is the BEST way to connect the networks in this situation?   


Options are :

  • RADIUS server
  • Wireless bridge (Correct)
  • Wireless repeater
  • Bluetooth

Answer : Wireless bridge

During a blizzard, a technician decides to work from home but is unable to connect to the  company’s network. Which of the following is MOST likely taking place at the office? 


Options are :

  • Switching loop
  • Wrong DNS
  • Power failure (Correct)
  • Duplicate IP address

Answer : Power failure

A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?   


Options are :

  • Option (Correct)
  • Scope
  • Reservation
  • Lease

Answer : Option

Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann’s problem?

Computer_ASwitch_A

IP: 10.0.0.60Int VLAN10

SM: 255.255.255.0IP address 10.0.0.1/28

GW: 10.0.0.1Speed 100 Duplex Full 


Options are :

  • Change the speed on the switch interface to 10Mbps
  • Change the IP address of the computer to 10.0.0.12 (Correct)
  • Change the duplex on the switch interface to half
  • Change the subnet mask of the computer to 255.255.255.240

Answer : Change the IP address of the computer to 10.0.0.12

Which of the following can be used to limit wireless network access to a single computer? 


Options are :

  • Omni-directional antennas
  • Packet sniffing
  • MAC address filtering (Correct)
  • Configure PPP

Answer : MAC address filtering

A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex? 


Options are :

  • Distance
  • Auto-negotiate (Correct)
  • Frequency
  • Transmission speed

Answer : Auto-negotiate

After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic? 


Options are :

  • A switching loop was created. (Correct)
  • The router failed, flooding the network with beacons.
  • The new user is downloading large files.
  • The new user’s IP address is a duplicate.

Answer : A switching loop was created.

Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point, drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this?   


Options are :

  • Move one or more access points, minimizing signal overlap. (Correct)
  • Establish procedures which limit user connections during peak hours.
  • Configure the access points so that they all use different SSIDs.
  • Reconfigure the access points from 802.11b to 802.11g.

Answer : Move one or more access points, minimizing signal overlap.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions