Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 511 – (Topic 5)

Which of the following security appliances are used to only identify traffic on individual systems?

  1. Host based IPS

  2. Application based IPS

  3. Network based IDS

  4. Host based IDS

Answer: D

Question No: 512 – (Topic 5)

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

  1. SNMPv2 access only

  2. TELNET access only

  3. SSH access only

  4. Console access only

Answer: D

Question No: 513 – (Topic 5)

Which of the following is used by RADIUS to encrypt messages between the server and the client?

  1. Public key

  2. CSU/DSU

  3. Private key

  4. Shared secret

Answer: D

Question No: 514 – (Topic 5)

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

  1. Man-in-the-middle attack.

  2. Rogue access point.

  3. Evil twin.

  4. Packet sniffer.

Answer: B

Question No: 515 – (Topic 5)

Users are unable to access the company’s intranet website. Which of the following attacks has the network MOST likely experienced?

  1. Man-in-the-middle

  2. Smurf

  3. Trojan

  4. DoS

Answer: D

Question No: 516 – (Topic 5)

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

  1. Content filtering

  2. Port filtering

  3. MAC filtering

  4. IP filtering

Answer: B

Question No: 517 – (Topic 5)

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

  1. Packet filtering

  2. Hardware firewalls

  3. Port security

  4. Stateful inspection

Answer: C

Question No: 518 – (Topic 5)

An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use?

  1. Ping

  2. Nessus

  3. IMAP

  4. Telnet

Answer: B

Question No: 519 – (Topic 5)

Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

  1. Device placement

  2. MAC address filtering

  3. User authentication

  4. Encryption protocols

Answer: A

Question No: 520 – (Topic 5)

Which of the following protocols works at the LOWEST layer of the OSI model?

  1. L2TP

  2. PPTP

  3. ISAKMP

  4. IPSec

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No