Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JK0-019 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-019 Exam Dumps - CompTIA E2C Network + Certification Exam

Go to page:
Question # 41

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).

A.

TFTP

B.

SNMP

C.

POP3

D.

IMAP4

E.

SFTP

Full Access
Question # 42

A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?

A.

Data link

B.

Network

C.

Session

D.

Physical

Full Access
Question # 43

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model?

A.

Transport

B.

Application

C.

Internet

D.

Network Interface

Full Access
Question # 44

A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?

A.

VLANs

B.

PoE

C.

PAT

D.

VPN

Full Access
Question # 45

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Full Access
Question # 46

Which of the following uses port 23 by default?

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

Full Access
Question # 47

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used?

A.

Virtual switch

B.

Virtual server

C.

Virtual desktop

D.

Virtual PBX

Full Access
Question # 48

Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?

A.

WEP cracking

B.

WPA cracking

C.

War driving

D.

Rogue access point

Full Access
Go to page: