JK0-019 CompTIA E2C Network + Certification Exam Set 9

Frame relay occurs at which of the following layers of the OSI model? 


Options are :

  • Layer 2 (Correct)
  • Layer 4
  • Layer 1
  • Layer 6

Answer : Layer 2

At which layer of the OSI and TCP/IP model would HTTP and FTP be found? 


Options are :

  • Session
  • Application (Correct)
  • Network
  • Data Link

Answer : Application

At which layer of the TCP/IP model would cabling exist? 


Options are :

  • Transport
  • Network Interface (Correct)
  • Application
  • Internet

Answer : Network Interface

Which of the following ports is used by Telnet?   


Options are :

  • 143
  • 21
  • 80
  • 23 (Correct)

Answer : 23

Which of the following is a public class C IP address? 


Options are :

  • 4.2.2.2
  • 192.168.1.34
  • 175.35.46.60
  • 194.178.12.54 (Correct)

Answer : 194.178.12.54

An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO).

A. TCP 23

B. TCP 53

C. TCP 123

D. UDP 23

E. UDP 53   

F. UDP 123 


Options are :

  • B,E (Correct)
  • D,F
  • C,D
  • A,B

Answer : B,E

Which of the following protocols occurs at Layer 4 of the OSI model? 


Options are :

  • UDP (Correct)
  • IPX
  • ISDN
  • GRE

Answer : UDP

Which of the following IP address/CIDR combinations represent public address space? (Select TWO).

A. 10.1.1.1/8

B. 172.15.1.1/16

C. 172.16.1.1/16

D. 172.31.1.1/16

E. 193.168.2.1/24

F. 224.0.0.1/32 


Options are :

  • A,F
  • B,E (Correct)
  • A,B
  • C,D

Answer : B,E

A technician has resolved a ticket to fix a users printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?   


Options are :

  • Upgrade the printer drivers
  • Close out the service ticket
  • Establish a theory of probably cause
  • Document findings and outcomes (Correct)

Answer : Document findings and outcomes

Which of the following uses a 128-bit addressing scheme?   


Options are :

  • IPv6 (Correct)
  • MAC
  • DHCP
  • IPv4

Answer : IPv6

An IP address is encapsulated at which of the following layers of the OSI model? 


Options are :

  • Application
  • Transport
  • Data link
  • Network (Correct)

Answer : Network

Which of the following are considered unsecure access methods? (Select TWO).

A. FTP

B. IPSec

C. RCP

D.SCP

E. SFTP     


Options are :

  • D,E
  • A,C (Correct)
  • A,B
  • C,D

Answer : A,C

Which of the following correctly lists the layers of the OSI model starting at Layer 1? 


Options are :

  • Physical, Data Link, Network, Transport, Session, Presentation, Application. (Correct)
  • Physical, Data Link, Transport, Network, Session, Presentation, Application.
  • Data Link, Physical, Network, Transport, Presentation, Session, Application.
  • Physical, Data Link, Network, Transport, Presentation, Session, Application

Answer : Physical, Data Link, Network, Transport, Session, Presentation, Application.

Which of the following remote access protocols is commonly used for command line access to a device?   


Options are :

  • RAS
  • VPN
  • SSH (Correct)
  • RDP

Answer : SSH

Which of the following port numbers needs to be open on a firewall to allow FTP traffic?   


Options are :

  • 22
  • 23
  • 25
  • 21 (Correct)

Answer : 21

A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols? 


Options are :

  • POP3
  • SSH
  • HTTPS (Correct)
  • SMTP

Answer : HTTPS

Which of the following contains the SYN and ACK flags? 


Options are :

  • UDP header
  • IP header
  • ICMP header
  • TCP header (Correct)

Answer : TCP header

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?   


Options are :

  • DHCP (Correct)
  • DNS
  • IDS
  • RADIUS

Answer : DHCP

After a new firewall is installed, users report that they do not have connectivity to the Internet. The  output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).

A. UDP 53

B. UDP 67

C. UDP 68

D. TCP 53

E. TCP 67

F. TCP 68 


Options are :

  • B,C (Correct)
  • C,F
  • A,B
  • D,E

Answer : B,C

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).

A. 172.16.0.255

B. 172.16.0.0

C. 172.16.1.1

D. 172.16.8.0

E. 172.16.256.255 


Options are :

  • C,D
  • A,B
  • D,E
  • A,C (Correct)

Answer : A,C

On which of the following layers of the OSI model does IP operate?   


Options are :

  • Data link
  • Session
  • Network (Correct)
  • Transport

Answer : Network

At which of the following layers of the OSI model is the Logical Link Control found? 


Options are :

  • Layer 2 (Correct)
  • Layer 5
  • Layer 4
  • Layer 3

Answer : Layer 2

A multi-layer switch operates at which of the following OSI layers? 


Options are :

  • Layers 4 and 5
  • Layers 5 and 6
  • Layers 1 and 5
  • Layers 2 and 3 (Correct)

Answer : Layers 2 and 3

Which of the following protocols exchange the latest information that has changed in the routing table? 


Options are :

  • OSPF (Correct)
  • IGMP
  • TFTP
  • BGP

Answer : OSPF

203.50.5.0 is an example of which of the following network classes? 


Options are :

  • Class D
  • Class B
  • Class A
  • Class C (Correct)

Answer : Class C

A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used? 


Options are :

  • TFTP
  • SNMPv3 (Correct)
  • FTP
  • Telnet

Answer : SNMPv3

Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses? 


Options are :

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0 (Correct)
  • 255.255.255.254

Answer : 255.255.255.0

The components of a NIC function at which of the following layers of the OSI model? (Select TWO).

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

E. Layer 5 


Options are :

  • D,E
  • A,C
  • C,D
  • A,B (Correct)

Answer : A,B

Which of the following is an advantage of dynamic routing? 


Options are :

  • The setup and configuration are done manually.
  • The routes do not change.
  • It is the simplest form of routing.
  • It can reroute connectivity in the event of failure. (Correct)

Answer : It can reroute connectivity in the event of failure.

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address? 


Options are :

  • Subnet
  • Site-local
  • EUI-64 (Correct)
  • IANA prefix

Answer : EUI-64

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions