This page was exported from Braindump2go Free Latest Microsoft Hot Exam Dumps In PDF & VCE Free Download
[
https://www.symantecdumps.com
]
Export date: Thu Mar 28 8:00:43 2024 / +0000 GMT
QUESTION 1 A. Conduct a vulnerability scan Answer: B QUESTION 2 A. Behavioral Based IDS Answer: D QUESTION 3 A. Set up an account with an Internet service provider. Answer: B QUESTION 4 A. A username and PIN Answer: D QUESTION 5 A. RJ-11 Answer: D QUESTION 6 A. DNS suffixes Answer: B QUESTION 7 A. The signal strength has been degraded and latency is increasing hop count. Answer: B QUESTION 8 A. MAC filtering Answer: A QUESTION 9 A. Bus Answer: D QUESTION 10 A. QoS Answer: C QUESTION 11 A. RAS Answer: C QUESTION 12 A. Change the encryption method to WPA Answer: AD QUESTION 13 A. High availability Answer: AB QUESTION 14 A. Access point. Answer: D QUESTION 15 A. Incorrect subnet mask Answer: B QUESTION 16 A. 8 bytes Answer: B QUESTION 17 A. Packet sniffers Answer: B QUESTION 18 A. The user's NIC does not support 1Gbps Answer: A QUESTION 19 A. The transport OSI model layer and the transport TCP/IP model layer Answer: A QUESTION 20 A. Load balancer Answer: A
Sandy, the network administrator, has funding to do a major upgrade of the company's LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment
Sandy, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?
B. Signature Based IDS
C. Behavioral Based IPS
D. Signature Based IPS
Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?
B. Create a list of requirements and constraints.
C. Arrange a domain name with a suitable registrar.
D. Choose the correct operating system version.
Which of the following is an example of two-factor authentication?
B. A username and password
C. A username, password, finger print scan, and smart card
D. A username, password, and key fob number
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
B. BNC
C. LC
D. DB-9
Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?
B. Leases
C. Static IP addressing
D. Reservations
Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.
Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?
B. SSL VPN
C. PPPoE
D. WPA Enterprise
Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network?
B. Peer-to-peer
C. Ring
D. Star
Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?
B. POP3
C. PAT
D. SMTP
Which of the following is a form of encrypting packets for safe, secure data transmission within a network?
B. PPTP
C. IPSec
D. ICA
A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).
B. Limit the DHCP scope to only have three addresses total
C. Enable the SSID broadcast
D. Enable and configure MAC filtering
E. Change the broadcast channel to a less commonly used channel
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
The location that the local network connection ends and the ISP responsibility begins is known as the:
B. Default gateway.
C. IDF connection.
D. Demarcation point.
Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?
B. Incorrect DNS
C. Missing default gateway
D. Incorrect IPv6 address
Which of the following sizes is the fixed cell length in ATM?
B. 53 bytes
C. 64 kilobytes
D. 128 kilobytes
Which of the following network scanners detects and sends out alerts for malicious network activity?
B. IDS
C. Port scanners
D. IPS
Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port speed to 1000 Mbps. A user's PC is no longer able to access the network. Which of the following is MOST likely the problem?
B. The switch is not compatible with 1000Mbps.
C. The user's NIC does not support 100Mbps.
D. Joe needs to restart the DNS server.
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?
B. The transport OSI model layer and the Internet TCP/IP model layer
C. The network OSI model layer and the transport TCP/IP model layer
D. The network OSI model layer and the Internet TCP/IP model layer
Which of the following network appliances would facilitate an even amount of traffic hitting each web server?
B. VPN concentrator
C. Proxy server
D. Content filter
Passing your CompTIA JK0-019 Exam by using the latest CompTIA JK0-019 Exam Dump Full Version: http://www.braindump2go.com/jk0-019.html
Post date: 2014-07-31 09:06:59
Post date GMT: 2014-07-31 09:06:59
Post modified date: 2014-07-31 09:06:59
Post modified date GMT: 2014-07-31 09:06:59
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com