Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 Exam Dumps - CompTIA Network+ certification

Go to page:
Question # 113

After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process?

A.

Implement the solution to the problem.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Implement preventative measures.

Full Access
Question # 114

Which of the following routing protocols utilizes the DUAL algorithm for determining best path?

A.

EIGRP

B.

RIPv2

C.

OSPF

D.

RIP

Full Access
Question # 115

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?

A.

Set the VLAN preferences on the host's NIC

B.

Create each VLAN on the host's virtual switch

C.

Change the virtual machine NIC settings from private to bridged

D.

Create each VLAN on the host's gateway router

Full Access
Question # 116

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step?

A.

Identify the problem

B.

Question the user

C.

Establish a plan of action

D.

Establish a theory of probable cause

Full Access
Question # 117

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

A.

Allow ANY to 192.168.0.15 port 21

B.

Allow ANY to 192.168.0.15 port 22

C.

Allow ANY to 192.168.0.15 port 80

D.

Allow ANY to ANY port ANY

Full Access
Question # 118

Which of the following can use a third party back-end LDAP user database for authentication?

A.

ISAKMP

B.

TACACS+

C.

PKI

D.

CHAP

Full Access
Question # 119

Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach’s own country. Which of the following security measures could he use to set up this functionality?

A.

MAC filtering

B.

Port filtering

C.

IP filtering

D.

TLS

Full Access
Question # 120

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

A.

The network cable connecting the NAS to the network switch is bad.

B.

The network port that the appliance is connected to is assigned to the wrong VLAN.

C.

Port security on the Ethernet switch has disabled the port.

D.

Firewall needs to be updated for the new NAS device.

Full Access
Go to page: