JK0-019 questions pool(406 to 420) for client: Apr 2016 Edition

Exam Code: JK0-019 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Network+ Certification Exam (JK0-019)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass JK0-019 Exam.

2016 Apr JK0-019 Study Guide Questions:

Q406. A company has decided to increase wireless infrastructure security by moving from WEP encryption to WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem? 

A. The users who cannot connect are using older NICs without WPA2 support. 

B. The users who cannot connect are in areas without wireless coverage. 

C. The users who cannot connect have not been placed in the correct VLAN. 

D. The users who cannot connect have not specified the correct signal strength 

Answer: A 


Q407. Which of the following networks would MOST likely require EGP routing? 

A. Networks that use OSPF in addition to static routes 

B. Networks with classless Internet domain routing 

C. Networks with multiple ISPs 

D. Networks that use encryption 

Answer: C 


Q408. Which of the following metrics indentifies the number of connections that is between two devices? 

A. Hop count 

B. MTU 

C. Latency 

D. Bandwidth 

Answer: A 


Q409. Which of the following protocols uses UDP to transfer files? 

A. FTP 

B. SFTP 

C. SMTP 

D. TFTP 

Answer: D 


Q410. How many bits are in an IPv6 address? 

A. 32 

B. 64 

C. 128 

D. 256 

Answer: C 


JK0-019 test question

Refresh JK0-019 practice test:

Q411. Which of the following is a correct IP ACL? (Select TWO) 

A. PERMIT 192.268.20.1 

B. DROP 00-12-34-56-78-9A 

C. DENYO:::0:::0:::3 

D. DENY ANY ANY 

E. PERMIT 192.168 1.100 80 

Answer: DE 


Q412. Sandy, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Sandy use in this scenario? 

A. Event logs 

B. Baselines 

C. Change management 

D. Syslog 

Answer: D 


Q413. Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch? 

A. ARP spoofing 

B. VLAN 

C. Mirroring 

D. Spanning tree 

Answer: C 


Q414. Which of the following technologies is used on the backbone of an ISDN? 

A. VDSL 

B. SDSL 

C. OC3 

D. ATM 

Answer: D 


Q415. A technician is troubleshooting a network connectivity issue. Given the following abbreviated trace route output: 

1 192.168.1.1 

2 172.16.40.1 

310.4.0.1 

4172.16.40.1 

Which of the following is MOST likely occurring? 

A. Switching loop 

B. Broadcast storm 

C. IP conflict 

D. Routing loop 

Answer: D 


JK0-019 simulations

Breathing JK0-019 free samples:

Q416. Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types? 

A. Physical 

B. Logical 

C. Software 

D. Authentication 

Answer: A 


Q417. Which of the following has the HIGHEST data rate speed? 

A. T1 

B. ADSL 

C. SDSL 

D. OC-3 

Answer: D 


Q418. Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked? 

A. Change management 

B. System logs 

C. Asset management 

D. Baselining 

Answer: A 


Q419. Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process? 

A. Conduct a vulnerability scan 

B. Establish a network baseline 

C. Conduct traffic analysis 

D. Conduct a risk assessment 

Answer: B 


Q420. Which of the following analyzes the entire subnet to identify all hosts that are active? 

A. Ping sweep 

B. Packet sniffer 

C. Traceroute 

D. Port scanner 

Answer: A