Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 Exam Dumps - CompTIA Network+ certification

Go to page:
Question # 57

Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:

IP address: 192.168.0.124

Subnet Mask: 255.255.255.128

Default Gateway: 192.168.0.254

Which is MOST likely preventing the user from accessing the Internet?

A.

Duplicate IP address

B.

Incorrect gateway

C.

Incorrect VLAN

D.

Bad switch port

Full Access
Question # 58

Which of the following WAN technologies uses an analog phone line to transmit data?

A.

LTE

B.

DSL

C.

Satellite

D.

Cable

Full Access
Question # 59

Which of the following ports does IMAP use by default?

A.

110

B.

123

C.

143

D.

443

Full Access
Question # 60

Which of the following protocols provides a secure connection between two networks?

A.

L2TP

B.

IPSec

C.

PPP

D.

PPTP

Full Access
Question # 61

A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician use to complete this objective QUICKEST?

A.

Traffic analyzer

B.

Network sniffer

C.

SNMPv3

D.

System logs

Full Access
Question # 62

Which of the following devices can be used to offload outbound web server SSL encryption overhead?

A.

NIPS

B.

Proxy server

C.

Content filter

D.

VPN concentrator

Full Access
Question # 63

Which of the following security devices is used in providing packet and MAC address filtering services for the network?

A.

Host-based proxy server

B.

Network-based firewall

C.

IDS

D.

IPS

Full Access
Question # 64

Which of the following solutions will detect and disable a rogue access point?

A.

Port scan

B.

Packet sniffer

C.

IPS

D.

IDS

Full Access
Go to page: