Exam Code: JK0-019 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Network+ Certification Exam (JK0-019)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass JK0-019 Exam.
2021 Apr JK0-019 Study Guide Questions:
Q406. A company has decided to increase wireless infrastructure security by moving from WEP encryption to WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem?
A. The users who cannot connect are using older NICs without WPA2 support.
B. The users who cannot connect are in areas without wireless coverage.
C. The users who cannot connect have not been placed in the correct VLAN.
D. The users who cannot connect have not specified the correct signal strength
Answer: A
Q407. Which of the following networks would MOST likely require EGP routing?
A. Networks that use OSPF in addition to static routes
B. Networks with classless Internet domain routing
C. Networks with multiple ISPs
D. Networks that use encryption
Answer: C
Q408. Which of the following metrics indentifies the number of connections that is between two devices?
A. Hop count
B. MTU
C. Latency
D. Bandwidth
Answer: A
Q409. Which of the following protocols uses UDP to transfer files?
A. FTP
B. SFTP
C. SMTP
D. TFTP
Answer: D
Q410. How many bits are in an IPv6 address?
A. 32
B. 64
C. 128
D. 256
Answer: C
Refresh JK0-019 practice test:
Q411. Which of the following is a correct IP ACL? (Select TWO)
A. PERMIT 192.268.20.1
B. DROP 00-12-34-56-78-9A
C. DENYO:::0:::0:::3
D. DENY ANY ANY
E. PERMIT 192.168 1.100 80
Answer: DE
Q412. Sandy, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Sandy use in this scenario?
A. Event logs
B. Baselines
C. Change management
D. Syslog
Answer: D
Q413. Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?
A. ARP spoofing
B. VLAN
C. Mirroring
D. Spanning tree
Answer: C
Q414. Which of the following technologies is used on the backbone of an ISDN?
A. VDSL
B. SDSL
C. OC3
D. ATM
Answer: D
Q415. A technician is troubleshooting a network connectivity issue. Given the following abbreviated trace route output:
1 192.168.1.1
2 172.16.40.1
310.4.0.1
4172.16.40.1
Which of the following is MOST likely occurring?
A. Switching loop
B. Broadcast storm
C. IP conflict
D. Routing loop
Answer: D
Breathing JK0-019 free samples:
Q416. Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?
A. Physical
B. Logical
C. Software
D. Authentication
Answer: A
Q417. Which of the following has the HIGHEST data rate speed?
A. T1
B. ADSL
C. SDSL
D. OC-3
Answer: D
Q418. Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
A. Change management
B. System logs
C. Asset management
D. Baselining
Answer: A
Q419. Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
A. Conduct a vulnerability scan
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment
Answer: B
Q420. Which of the following analyzes the entire subnet to identify all hosts that are active?
A. Ping sweep
B. Packet sniffer
C. Traceroute
D. Port scanner
Answer: A