Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JK0-019 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-019 Exam Dumps - CompTIA E2C Network + Certification Exam

Go to page:
Question # 49

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Full Access
Question # 50

Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?

A.

A

B.

B

C.

G

D.

N

Full Access
Question # 51

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Full Access
Question # 52

A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?

A.

Change management

B.

Asset management

C.

Network sniffer

D.

System logs

Full Access
Question # 53

Which of the following should be mitigated by employing proper coding techniques when developing software?

A.

Distributed denial of service attacks

B.

Buffer overflows

C.

War driving

D.

Packet sniffing

Full Access
Question # 54

In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented?

A.

Scope options

B.

Leases

C.

Reservations

D.

DNS suffixes

Full Access
Question # 55

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?

A.

Escalate the problem

B.

Identify potential effects

C.

Test the theory to determine cause

D.

Establish a plan of action to resolve the problem

Full Access
Question # 56

On which of the following OSI model layers would a MAC address be used?

A.

Network

B.

Data Link

C.

Transport

D.

Physical

Full Access
Go to page: