[Free] 2018(June) Dumps4cert CompTIA JK0-023 Dumps with VCE and PDF Download 351-360

By | July 3, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 351 – (Topic 4)

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

  1. nslookup

  2. ifconfig

  3. dig

  4. ipconfig

Answer: D

Question No: 352 – (Topic 4)

A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Lisa, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement?

  1. Syslog


  3. IPSec

  4. Network sniffer

Answer: A

Question No: 353 – (Topic 4)

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion: lt;maskedgt; msgUsername: lt;maskedgt;

msgAuthenticationParameters: lt;maskedgt; msgPrivacyParameters: lt;maskedgt; msgData:

data: get-request request-id: lt;maskedgt; error-status: noError (0)

error-index: 0

variable-bindings: 0 items

  1. SNMPv3

  2. SSH

  3. HTTP

  4. SNMPv1

Answer: A

Question No: 354 – (Topic 4)

A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?

  1. nbstat

  2. arp

  3. nslookup

  4. ipconfig

Answer: C

Question No: 355 – (Topic 4)

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

  1. IPS logs

  2. Application logs

  3. IDS logs

  4. History logs

Answer: A

Question No: 356 – (Topic 4)

A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?

  1. System log

  2. History log

  3. Network sniffer

  4. Nslookup

Answer: C

Question No: 357 – (Topic 4)

A VPN concentrator is used for which of the following purposes?

  1. MAC filtering

  2. Content filtering

  3. Secure network access

  4. Connectivity troubleshooting

Answer: C

Question No: 358 – (Topic 4)

Port scanners and packet sniffers differ in functionality because:

  1. packet sniffers and port scanners are just different names for the same device.

  2. packet sniffers can only log events on traffic activity and port scanners can route malicious packets.

  3. packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain NICs.

  4. port scanners are limited to detecting open ports and packet sniffers watch all traffic.

Answer: D

Question No: 359 – (Topic 4)

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

  1. Combined DNS and DHCP hosting

  2. Encryption

  3. Content filtering

  4. Fault tolerance

  5. Website caching

Answer: C,E

Question No: 360 – (Topic 4)

Karen, an administrator, finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?

  1. Butt set

  2. Punch down tool

  3. Cable tester

  4. Cable stripper

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.