New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA JK0-023 CompTIA Network+ certification Exam Practice Test

Demo: 120 questions
Total 1112 questions

CompTIA Network+ certification Questions and Answers

Question 1

Which of the following protocols is used by the ping command?

Options:

A.

SMTP

B.

ICMP

C.

TFTP

D.

ARP

Question 2

Which of the following uses port 23 by default?

Options:

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

Question 3

Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?

Options:

A.

Wide Area Network

B.

NAT

C.

Virtual PBX

D.

Virtual LAN

Question 4

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.192

D.

255.255.255.248

Question 5

Which of the following protocols uses port 3389 by default?

Options:

A.

RDP

B.

TFTP

C.

IMAP

D.

DNS

Question 6

Frame relay occurs at which of the following layers of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 6

Question 7

A forward lookup zone converts which of the following?

Options:

A.

IP addresses to hostnames

B.

Hostnames to IP addresses

C.

MAC addresses to IP addresses

D.

IP Addresses to MAC addresses

Question 8

Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections?

Options:

A.

BGP

B.

SNAT

C.

RIP

D.

GPG

Question 9

Which protocol is represented by the packet capture below?

UDP 0.0.0.0:68 -> 255.255.255.255:67

Options:

A.

DHCP

B.

FTP

C.

SNMP

D.

DNS

Question 10

In order for switching loops to be automatically disabled, which of the following needs to be implemented?

Options:

A.

Routing tables

B.

Collision domains

C.

Port mirroring

D.

Spanning-tree protocol

Question 11

Which of the following BEST describes a switch port?

Options:

A.

Broadcast domain

B.

Distance vector

C.

Link state

D.

Collision domain

Question 12

A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

Options:

A.

Session

B.

Application

C.

Network

D.

Physical

Question 13

Which of the following is used to describe trunking VLANs on a network?

Options:

A.

802.11a

B.

802.11i

C.

802.1q

D.

802.1x

Question 14

Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?

Options:

A.

CNAME

B.

A

C.

MX

D.

PTR

Question 15

Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?

Options:

A.

RTP

B.

NTP

C.

TFTP

D.

ARP

Question 16

Which of the following would Joe, a technician, use for a service that needs fast communication and is unaffected by packet loss?

Options:

A.

UDP

B.

ARP

C.

ICMP

D.

TCP

Question 17

A technician has resolved a ticket to fix a user’s printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?

Options:

A.

Document findings and outcomes

B.

Establish a theory of probably cause

C.

Upgrade the printer drivers

D.

Close out the service ticket

Question 18

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?

Options:

A.

Set the VLAN preferences on the host's NIC

B.

Create each VLAN on the host's virtual switch

C.

Change the virtual machine NIC settings from private to bridged

D.

Create each VLAN on the host's gateway router

Question 19

Which of the following protocols does DNS utilize on port 53?

Options:

A.

TCP

B.

FTP

C.

RTP

D.

ICMP

Question 20

A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?

Options:

A.

Verify full system functionality

B.

Identify the problem

C.

Establish a theory

D.

Implement the solution

Question 21

An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?

Options:

A.

25

B.

53

C.

110

D.

443

Question 22

Which of the following is used to prevent Layer 2 switching loops within a local area network?

Options:

A.

STP

B.

MTU

C.

EGP

D.

IGP

Question 23

A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?

Options:

A.

Data link

B.

Network

C.

Session

D.

Physical

Question 24

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?

Options:

A.

Subnet

B.

IANA prefix

C.

EUI-64

D.

Site-local

Question 25

At which layer of the TCP/IP model would cabling exist?

Options:

A.

Network Interface

B.

Internet

C.

Application

D.

Transport

Question 26

Which of the following is used to create a secure connection between a client and a host?

Options:

A.

VLAN

B.

Proxy server

C.

IIS server

D.

VPN

Question 27

A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?

Options:

A.

PoE

B.

Layer 3 switching

C.

STP

D.

VLAN

Question 28

A technician is troubleshooting a host name being directed to the wrong system. The ‘arp –a’ command line utility is used to identify and display which of the following?

Options:

A.

All TCP/IP connections and listening ports

B.

Internet-to-adapter translation tables

C.

Information to help diagnose DNS issues

D.

Active sockets and connections

Question 29

Which of the following network protocols is used for a secure command line interface for management of network devices?

Options:

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Question 30

Which of the following ports is used by Telnet?

Options:

A.

21

B.

23

C.

80

D.

143

Question 31

The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the:

Options:

A.

hypervisor.

B.

LPAR.

C.

broker.

D.

VDI.

Question 32

Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?

Options:

A.

250

B.

254

C.

255

D.

256

Question 33

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?

Options:

A.

RADIUS

B.

DNS

C.

DHCP

D.

IDS

Question 34

Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through single mode fiber?

Options:

A.

10GBaseLR

B.

100BaseFX

C.

100BaseTX

D.

1000BaseX

Question 35

When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

Options:

A.

Signal strength

B.

SSID enable

C.

Encryption

D.

Password hardening

Question 36

In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

Options:

A.

NMAP

B.

ping

C.

nslookup

D.

tracert

Question 37

A user at a small business states that they cannot connect to the Internet via the company’s wireless network every time their cordless phone rings. Which of the following is MOST likely occurring?

Options:

A.

Interference

B.

Incorrect encryption type

C.

Latency

D.

SSID mismatch

Question 38

Spanning-Tree Protocol is used with which of the following network devices?

Options:

A.

Router

B.

NIC

C.

Switch

D.

DHCP server

Question 39

Which of the following configurations of a wireless network would be considered MOST secure?

Options:

A.

WEP using MAC Filtering

B.

WEP and hiding the SSID

C.

WPA2

D.

WPA TKIP and hiding the SSID

Question 40

Which of the following protocols can be implemented to provide encryption during transmission between email gateways?

Options:

A.

TLS

B.

PPTP

C.

SSH

D.

HTTPS

Question 41

A technician has set up a wired network IP scheme with the following specifications:

DHCP: 192.168.1.100-150

Gateway: 192.168.1.1

DNS: 192.168.1.1

Which of the following is represented by this addressing scheme?

Options:

A.

Static

B.

QoS

C.

Dynamic

D.

Dynamic with static reservation

Question 42

A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?

Options:

A.

Scope

B.

Reservation

C.

Option

D.

Lease

Question 43

A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?

Options:

A.

Channel

B.

SSID

C.

Firewall rule

D.

Encryption

Question 44

Which of the following will prevent switching loops by selectively shutting down switch ports?

Options:

A.

RIP

B.

IGP

C.

STP

D.

VLAN

Question 45

A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?

Options:

A.

Reduce the power input on the replacement servers.

B.

Cover the servers with plastic tarps.

C.

Purchase twice as many servers to create high availability clusters.

D.

Transfer the replacement servers offsite to a data center.

Question 46

A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?

Options:

A.

The IDS server logs

B.

The DNS resolution time

C.

The firewall’s blocked logs

D.

The patch cable

Question 47

A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?

Options:

A.

Social engineering

B.

Packet sniffing

C.

Rogue access point

D.

Man-in-the-middle

Question 48

Which of the following would allow for a specific device to receive the same IP address from a DHCP server?

Options:

A.

Scope

B.

Reservation

C.

Suffix

D.

Lease

Question 49

Which of the following technologies is used on cellular networks?

Options:

A.

Ethernet

B.

CDMA

C.

CSMA/CA

D.

POTS

Question 50

Which of the following WAN technologies has the highest latency?

Options:

A.

POTS

B.

Cable

C.

Satellite

D.

DSL

Question 51

MIMO technology in the 802.11n standard provides for which of the following benefits?

Options:

A.

Channel expansion

B.

Gigabit wireless bandwidth

C.

Multipath support

D.

Channel bonding

Question 52

A user’s new computer is not able to connect to the network at all. Upon further investigation, Karen, the administrator, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable in the IDF, which of the following is the MOST likely cause of the problem?

Options:

A.

Other end of the cable is terminated with a 568B configuration

B.

Trunk port on the switch is disabled

C.

Other end of the cable is terminated with a 568A configuration

D.

Wall jack needs to be replaced with a smart jack

Question 53

Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?

Options:

A.

Dual frequency

B.

Enhanced encryption

C.

MIMO technology

D.

Backwards compatibility

Question 54

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

Options:

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Question 55

Which of the following are standard fiber cable connector types? (Select TWO).

Options:

A.

RJ-11

B.

F-connector

C.

MTRJ

D.

DB-9

E.

ST

Question 56

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?

Options:

A.

Switch the channel

B.

Change frequencies

C.

Channel bonding

D.

Increase the signal

Question 57

Which of the following is the MAXIMUM data transmission rate of 802.11a?

Options:

A.

8Mbps

B.

11Mbps

C.

54Mbps

D.

107Mbps

Question 58

Which of the following cable types is required to run through an air duct?

Options:

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Question 59

Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of 155.54Mbps?

Options:

A.

DS3

B.

E3

C.

OC3

D.

T3

Question 60

Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?

Options:

A.

Multimode fiber

B.

CAT6a

C.

Single mode fiber

D.

Coaxial

Question 61

Which of the following uses copper wiring?

Options:

A.

10GBaseER

B.

10GBaseLW

C.

100BaseFX

D.

1000BaseT

Question 62

Which of the following has a DB-9 connector?

Options:

A.

SC

B.

RS-232

C.

LC

D.

RJ-45

Question 63

Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?

Options:

A.

CSMA/CA

B.

CSMA/CD

C.

Wireless encryption

D.

Wireless bonding

Question 64

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

Options:

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Question 65

Which of the following connectors are MOST commonly used on a POTS line?

Options:

A.

RJ-45

B.

MTRJ

C.

DB-9

D.

RJ-11

Question 66

Which of the following is the FASTEST Ethernet technology?

Options:

A.

10GBaseSR

B.

10BaseT

C.

100BaseFX

D.

1000BaseT

Question 67

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

Options:

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Question 68

In which of the following wireless standards is MIMO used?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 69

Which of the following technologies can cause interference for 802.11g?

Options:

A.

RADAR

B.

802.11a

C.

IrDA

D.

Bluetooth

Question 70

Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?

Options:

A.

A 110 block

B.

A demarc

C.

A DB-9

D.

A smart jack

Question 71

Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?

Options:

A.

Router

B.

MDF

C.

IDF

D.

Demarc

Question 72

Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?

Options:

A.

A

B.

B

C.

G

D.

N

Question 73

The selection of the correct punch down tool to use depends on which of the following?

Options:

A.

Connector type

B.

Demarcation point location

C.

Block type

D.

Switch location

Question 74

DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOST likely use to verify this problem?

Options:

A.

arp

B.

nbtstat

C.

traceroute

D.

dig

Question 75

Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?

Options:

A.

Proxy server

B.

TDR

C.

Smart jack

D.

VPN concentrator

Question 76

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?

Options:

A.

QoS

B.

CARP

C.

VLAN

D.

DHCP server

Question 77

Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?

Options:

A.

traceroute

B.

ping

C.

ipconfig

D.

netstat

Question 78

A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?

Options:

A.

Cable certifier

B.

Throughput tester

C.

Loopback plug

D.

Multimeter

Question 79

Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach’s theory?

Options:

A.

Traffic analysis

B.

SNMP

C.

History logs

D.

System logs

Question 80

A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?

Options:

A.

netstat

B.

tracert

C.

nbtstat

D.

nslookup

Question 81

Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO).

Options:

A.

High availability

B.

Fault tolerance

C.

Reduce latency

D.

Wi-MAX

E.

CARP

Question 82

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

Options:

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Question 83

Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?

Options:

A.

Multimeter

B.

OTDR

C.

Link state

D.

Protocol analyzer

Question 84

Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

Options:

A.

Change management

B.

System logs

C.

Asset management

D.

Baselining

Question 85

Which of the following devices will allow Lisa, a user, to see a cached copy of websites?

Options:

A.

Content switch

B.

DNS server

C.

Proxy server

D.

Load balancer

Question 86

Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?

Options:

A.

Ping

B.

Protocol analyzer

C.

Tracert

D.

Dig

Question 87

Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?

Options:

A.

Network intrusion detection

B.

Traffic analysis tool

C.

Syslog server

D.

Network sniffer

Question 88

Which of the following does SNMPv3 BEST provide over previous versions?

Options:

A.

Increased security

B.

Simplified management

C.

More data types

D.

Higher productivity

Question 89

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

Options:

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Question 90

Which of the following performance benefits would multiple domain controllers BEST provide?

Options:

A.

Fault tolerance

B.

Caching engine

C.

Proxy server

D.

Quality of service

Question 91

Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

Options:

A.

Protocol analyzer

B.

Toner probe

C.

Cable certifier

D.

Cable stripper

Question 92

Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?

Options:

A.

Syslog files

B.

Honeypot

C.

Network sniffer

D.

tracert

Question 93

Which of the following is used to filter outgoing network requests?

Options:

A.

Proxy server

B.

VPN concentrator

C.

DHCP server

D.

IIS server

Question 94

After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?

Options:

A.

Multimeter

B.

Cable certifier

C.

Cable tester

D.

Toner probe

Question 95

A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?

Options:

A.

System log

B.

History log

C.

Network sniffer

D.

Nslookup

Question 96

Which of the following uses a Management Information Base (MIB) to monitor the network?

Options:

A.

History Logs

B.

Syslog

C.

SMTP

D.

SNMP

Question 97

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

Options:

A.

The network cable connecting the NAS to the network switch is bad.

B.

The network port that the appliance is connected to is assigned to the wrong VLAN.

C.

Port security on the Ethernet switch has disabled the port.

D.

Firewall needs to be updated for the new NAS device.

Question 98

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?

Options:

A.

Signal strength

B.

SSID name

C.

WPA2 encryption

D.

WEP encryption

Question 99

Which of the following is an example of two-factor authentication?

Options:

A.

A username and PIN

B.

A username and password

C.

A username, password, finger print scan, and smart card

D.

A username, password, and key fob number

Question 100

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Options:

A.

NetBIOS name filtering

B.

IP address filtering

C.

MAC address filtering

D.

Computer name filtering

Question 101

A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?

Options:

A.

802.11a with WPA2-Enterprise

B.

802.11n with WPA-PSK

C.

802.11n with WPA2-PSK

D.

802.11g with WPA-Enterprise

Question 102

The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?

Options:

A.

PAT

B.

DHCP

C.

DMZ

D.

NAT

Question 103

A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?

Options:

A.

EAP-LEAP

B.

MAC ACL

C.

EAP-TTLS

D.

MS-CHAPv2

Question 104

Honeypots and honeynets are different in which of the following ways?

Options:

A.

Honeynets are managed collections of honeypots.

B.

Honeypots only test software security, not hardware.

C.

Honeynets require specialized hardware to implement.

D.

Honeypots are usually servers and honeynets are routers and switches.

Question 105

Which of the following technologies allows multiple staff members to connect back to a centralized office?

Options:

A.

Peer to Peer

B.

VPN

C.

PKI

D.

VLAN

Question 106

Which of the following wireless security measures, although widely implemented, does not provide strong security?

Options:

A.

IPSec

B.

WPA2

C.

MAC address filtering

D.

802.1x

Question 107

Which of the following will a firewall NOT protect the network from?

Options:

A.

Intrusion

B.

DDoS

C.

Denial of Service

D.

Spam e-mails

Question 108

Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key words determined by the company?

Options:

A.

Stateless traffic monitor

B.

Stateful traffic monitor

C.

Signature identification

D.

Content filter

Question 109

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?

Options:

A.

Behavioral Based IDS

B.

Signature Based IDS

C.

Behavioral Based IPS

D.

Signature Based IPS

Question 110

Which of the following is a standard measure of signal power?

Options:

A.

MHz

B.

mips

C.

dBm

D.

Gbps

Question 111

Lisa, an administrator, believes that the network has been attacked and there is no known definition or prevention method to help avoid this attack. Which of the following BEST describes this scenario?

Options:

A.

Zero day attack

B.

DDoS

C.

DoS

D.

SQL injection

Question 112

Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic?

Options:

A.

Port filtering

B.

IP filtering

C.

MAC filtering

D.

Application filtering

Question 113

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?

Options:

A.

Packet sniffing

B.

Packet filter

C.

Stateful inspection

D.

Content filter

Question 114

The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following?

Options:

A.

MAC filtering

B.

Traffic shaping

C.

Session filtering

D.

IP filtering

Question 115

Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

Options:

A.

Packet sniffer

B.

Honeypot

C.

Port mirroring

D.

IPS

E.

Port scanner

F.

IDS

Question 116

Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?

Options:

A.

DNS

B.

NAT

C.

PKI

D.

RAS

Question 117

Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?

Options:

A.

Evil twin

B.

Honeypot

C.

DMZ

D.

Honeynet

Question 118

Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?

Options:

A.

Intrusion prevention software

B.

Packet sniffer

C.

Intrusion detection software

D.

Port scanner

Question 119

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

Options:

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Question 120

A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?

Options:

A.

Kerberos

B.

CHAP

C.

TACACS+

D.

RADIUS

Demo: 120 questions
Total 1112 questions