Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!
CompTIA Network certification
Question No: 521 – (Topic 5)
Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).
-
SSH
-
3DES
-
AES
-
SSL
-
TLS
-
TKIP
Answer: C,F
Question No: 522 – (Topic 5)
Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?
-
Behavioral Based IDS
-
Signature Based IDS
-
Behavioral Based IPS
-
Signature Based IPS
Answer: D
Question No: 523 – (Topic 5)
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
-
Evil twin
-
War chalking
-
Buffer overflow
-
Virus
Answer: A
Question No: 524 – (Topic 5)
An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?
-
Baseline analyzer
-
Ping
-
Protocol analyzer
-
Nessus
Answer: D
Question No: 525 – (Topic 5)
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
-
Stateful inspection
-
NAT/PAT
-
Port security
-
Implicit deny
Answer: D
Question No: 526 – (Topic 5)
Which of the following wireless security measures, although widely implemented, does not provide strong security?
-
IPSec
-
WPA2
-
MAC address filtering
D. 802.1x
Answer: C
Question No: 527 – (Topic 5)
A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:
Biometric fingerprint scan Complex 12 character password 5 digit pin code authorization
Randomized security question prompt upon login
Which of the following security setups does this company employ?
-
Single factor authentication
-
Three factor authentication
-
Two factor authentication
-
Single sign-on
Answer: C
Question No: 528 – (Topic 5)
Which of the following security devices is used in providing packet and MAC address filtering services for the network?
-
Host-based proxy server
-
Network-based firewall
-
IDS
-
IPS
Answer: B
Question No: 529 – (Topic 5)
Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
-
Decreasing radio strength
-
MAC filtering
-
WEP encryption
-
SSID broadcast disable
Answer: A
Question No: 530 – (Topic 5)
Sandy, an administrator, determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?
-
DDoS
-
Viruses
-
Worms
-
Man-in-the-middle
Answer: A
100% Dumps4cert Free Download!
–Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
–JK0-023 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |