JK0-019 CompTIA E2C Network + Certification Exam Set 4

Which of the following OSI layers allows users to access network services such as file sharing? 


Options are :

  • Layer 3
  • Layer 7 (Correct)
  • Layer 4
  • Layer 1

Answer : Layer 7

Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time? 


Options are :

  • Half-duplex
  • Full-duplex (Correct)
  • Burst-frame
  • VoIP

Answer : Full-duplex

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using? 


Options are :

  • SNMP (Correct)
  • Telnet
  • SSH
  • RADIUS

Answer : SNMP

Which of the following is used to register and resolve IP addresses with their plain language equivalents? 


Options are :

  • DNS server (Correct)
  • Brouter equipment
  • Proxy server
  • DHCP server

Answer : DNS server

Which of the following uses types and codes rather than ports? 


Options are :

  • IPv6
  • UDP
  • EIGRP
  • ICMP (Correct)

Answer : ICMP

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network? 


Options are :

  • Turning off the SMTP service on the email server
  • Closing off port 25 on the firewall (Correct)
  • Turning off the IMAP service on the email server
  • Closing off port 53 on the firewall

Answer : Closing off port 25 on the firewall

A MAC address is a part of which of the following OSI model layers? 


Options are :

  • Physical
  • Data Link (Correct)
  • Transport
  • Network

Answer : Data Link

Which of the following protocols is used to send time synchronization updates on a given network? 


Options are :

  • POP3
  • DNS
  • IMAP
  • NTP (Correct)

Answer : NTP

Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of the following could be the cause of this failure? 


Options are :

  • Incorrect gateway
  • Duplicate IP address (Correct)
  • Incorrect subnet mask
  • Wrong DNS

Answer : Duplicate IP address

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

A. Combined DNS and DHCP hosting

B. Encryption

C. Content filtering

D. Fault tolerance

E. Website caching   


Options are :

  • A,B
  • None
  • C,E (Correct)
  • B,D
  • C,D

Answer : C,E

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step? 


Options are :

  • Establish a plan of action (Correct)
  • Identify the problem
  • Establish a theory of probable cause
  • Question the user

Answer : Establish a plan of action

Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents? 


Options are :

  • Group security role assignments
  • Physical network diagrams
  • Wiring schematics
  • Logical network diagrams (Correct)

Answer : Logical network diagrams

A small company has a single multi-layer switch. The company currently has all network devices on the same subnet but would like to switch the servers to another subnet for security reasons. The company cannot budget any more money to purchase additional hardware. Which of the following features should be used to achieve the new company requirements? 


Options are :

  • VLAN (Correct)
  • PoE
  • QoS
  • PAT

Answer : VLAN

An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?   


Options are :

  • 110
  • 443
  • 25 (Correct)
  • 53

Answer : 25

Which of the following protocols does DNS utilize on port 53? 


Options are :

  • RTP
  • ICMP
  • FTP
  • TCP (Correct)

Answer : TCP

A user arrives at a new house and the Internet provider states the connection will run through the cable. If the user wants to install multiple PCs, which of the following will the user need in order to establish a connection? (Select TWO).

A. VPN

B. Router

C. T1 card

D.   WEP

E. Modem 


Options are :

  • B,E (Correct)
  • A,B
  • A,D
  • C,D

Answer : B,E

Hubs are differentiated from switches in that between the two, only hubs have: 


Options are :

  • multiple broadcast domains.
  • a single broadcast domain
  • multiple collision domains.
  • a single collision domain. (Correct)

Answer : a single collision domain.

The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model? 


Options are :

  • Layer 7 (Correct)
  • Layer 6
  • Layer 5
  • Layer 2

Answer : Layer 7

Which of the following network protocols is used to transport email across the Internet? 


Options are :

  • SMTP (Correct)
  • SNMP
  • SSH
  • NTP

Answer : SMTP

While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate? 


Options are :

  • This is the address for the DHCP server.
  • It is the default route. (Correct)
  • The firewall is down.
  • The PC has not been assigned an IP address.

Answer : It is the default route.

Which of the following protocols uses port 3389 by default? 


Options are :

  • DNS
  • RDP (Correct)
  • TFTP
  • IMAP

Answer : RDP

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO) 

A. Application

B. Physical

C. Presentation

D. Transport

E. Data Link

F. Network 


Options are :

  • D,F
  • C,D
  • B,E (Correct)
  • A,B

Answer : B,E

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST? 


Options are :

  • Question the obvious
  • Once a theory is confirmed determine the next step is to resolve the problem
  • Implement the solution or escalate as necessary
  • Determine if anything has changed (Correct)

Answer : Determine if anything has changed

A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask? 


Options are :

  • /26
  • /28
  • /29
  • /27 (Correct)

Answer : /27

A company has one public IP address, and only one device needs to be able to connect to the Internet at a time. Which of the following is the BEST option for connectivity? 


Options are :

  • CIDR
  • NAT (Correct)
  • VLSM
  • PAT

Answer : NAT

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?   


Options are :

  • 445
  • 3000 (Correct)
  • 80
  • 3389

Answer : 3000

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?   


Options are :

  • Establish a plan of action to resolve the problem
  • Escalate the problem (Correct)
  • Identify potential effects
  • Test the theory to determine cause

Answer : Escalate the problem

A router operates at which of the following layers of the OSI model?   


Options are :

  • Layer 3 (Correct)
  • Layer 5
  • Layer 4
  • Layer 2

Answer : Layer 3

The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this?   


Options are :

  • Enable packet filtering on the switch
  • Enable MAC filtering on the switch
  • Allow remote administration of the switch (Correct)
  • Allow VLAN routing

Answer : Allow remote administration of the switch

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? 


Options are :

  • VPN
  • MPLS (Correct)
  • PSTN
  • VLAN

Answer : MPLS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions