JK0-023 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?
User’s IP: 192.168.5.14
Server IP: 192.168.5.17
Permit 192.168.5.16/28192.168.5.0/28 Permit 192.168.5.0/24192.168.4.0/24 Permit 192.168.4.0/24192.168.5.0/24 Deny 192.168.5.0/28192.168.5.16/28 Deny 192.168.14.0/24192.168.5.16/28 Deny 192.168.0.0/24192.168.5.0/24
A. Deny 192.168.0.0/24192.168.5.0/24 B. Deny 192.168.5.0/28192.168.5.16/28
C. Deny 192.168.14.0/24192.168.5.16/28
D. Implicit Deny rule
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
Which of the following layers of the OSI model is between the Data Link and Transport layers?
A network is having problems with traffic flowing to several critical websites that are used for necessary company work. Which of the following appliances would BEST handle network traffic to increase network performance?
Network based firewall
Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?
Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?
nbtstat Answer: B QUESTION: 355
Which of the following can a technician use when a company implements redundant WAN links?
Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
Both T568A and T568B standards are being used.
STP is disabled.
The cable is not a crossover.
The port is not trunked.
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
Encryption set to Open in all Buildings
Encryption set to Open in Building B
Encryption set to WEP in Building B
Channel set to 11 in Building B
Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa’s workstation?
Which of the following technologies allows for redundant links within a Layer 2 segment?
A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?
Punch down tool
A user is unable to access any network resources. The IP configuration of the workstation is as follows:
IP Address: 192.168.10.32
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.10.46
Which of the following would allow the user to connect to network resources?
Change the default gateway to 192.168.10.1
Change the default gateway to 192.168.10.254
Change the IP address to 192.168.10.31
Change the IP address to 192.168.10.33
A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause?
A missing route on the alarm device.
Incorrect VLAN assignment on the router.
A missing route on the network routers.
Incorrect speed/duplex setting on the alarm device.
A network administrator suspects an employee of using the company’s Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
Read more Details »