Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 591 – (Topic 5)

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO).

  1. Layer 2 switch

  2. MAC address filtering

  3. ACLs

  4. IIS server

  5. Port scanner

  6. Firewall

Answer: C,F

Question No: 592 – (Topic 5)

An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

  1. Packet sniffer

  2. Honeypot

  3. Port mirroring

  4. IPS

  5. Port scanner

  6. IDS

Answer: A,C

Question No: 593 – (Topic 5)

Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?

  1. DoS attack

  2. Man-in-the-middle attack

  3. Smurf attack

  4. Xmas attack

Answer: B

Question No: 594 – (Topic 5)

An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity?

  1. Forwarding proxy

  2. Port address translation

  3. DMZ port security

  4. Application inspection

Answer: B

Question No: 595 – (Topic 5)

Which of the following is a form of encrypting packets for safe, secure data transmission within a network?

  1. RAS

  2. PPTP

  3. IPSec

  4. ICA

Answer: C

Question No: 596 – (Topic 5)

Which of the following solutions will detect and disable a rogue access point?

  1. Port scan

  2. Packet sniffer

  3. IPS

  4. IDS

Answer: C

Question No: 597 – (Topic 5)

Which of the following performs posture assessments for unknown devices that connect to the network?

  1. PKI

  2. EAP

  3. NAC

  4. AAA

Answer: C

Question No: 598 – (Topic 5)

Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?

  1. Evil twin

  2. Honeypot

  3. DMZ

  4. Honeynet

Answer: B

Question No: 599 – (Topic 5)

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

  1. Allow ANY to 192.168.0.15 port 21

  2. Allow ANY to 192.168.0.15 port 22

  3. Allow ANY to 192.168.0.15 port 80

  4. Allow ANY to ANY port ANY

Answer: B

Question No: 600 – (Topic 5)

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?

  1. Port filtering

  2. WEP

  3. MAC address filtering

  4. PoE

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No