Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 Exam Dumps - CompTIA Network+ certification

Go to page:
Question # 33

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).

A.

TFTP

B.

SNMP

C.

POP3

D.

IMAP4

E.

SFTP

Full Access
Question # 34

Data arranged into packets would be on which of the following layers of the OSI model?

A.

Datagram

B.

Transport

C.

Presentation

D.

Network

Full Access
Question # 35

Which of the following wiring distribution is used to connect wiring from equipment inside a company to carrier cabling outside a building?

A.

66 block

B.

IDF

C.

MDF

D.

Patch panel

Full Access
Question # 36

Which of the following tools would Lisa, an administrator, use to determine if there is a problem with a telephone line?

A.

Port scanner

B.

Punch down tool

C.

Butt set

D.

Toner probe

Full Access
Question # 37

Which of the following network devices hides network nodes behind one public IP address?

A.

Layer 3 switch

B.

Content filter

C.

VPN server

D.

Proxy server

Full Access
Question # 38

Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?

A.

Network intrusion detection

B.

Traffic analysis tool

C.

Syslog server

D.

Network sniffer

Full Access
Question # 39

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

A.

Increased uptime

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Full Access
Question # 40

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

A.

Asset management

B.

Baselines

C.

Network maps

D.

Change management

Full Access
Go to page: