[Free] 2018(June) Dumps4cert CompTIA JK0-023 Dumps with VCE and PDF Download 521-530

By | July 3, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 521 – (Topic 5)

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

  1. SSH

  2. 3DES

  3. AES

  4. SSL

  5. TLS

  6. TKIP

Answer: C,F

Question No: 522 – (Topic 5)

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?

  1. Behavioral Based IDS

  2. Signature Based IDS

  3. Behavioral Based IPS

  4. Signature Based IPS

Answer: D

Question No: 523 – (Topic 5)

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

  1. Evil twin

  2. War chalking

  3. Buffer overflow

  4. Virus

Answer: A

Question No: 524 – (Topic 5)

An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

  1. Baseline analyzer

  2. Ping

  3. Protocol analyzer

  4. Nessus

Answer: D

Question No: 525 – (Topic 5)

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

  1. Stateful inspection

  2. NAT/PAT

  3. Port security

  4. Implicit deny

Answer: D

Question No: 526 – (Topic 5)

Which of the following wireless security measures, although widely implemented, does not provide strong security?

  1. IPSec

  2. WPA2

  3. MAC address filtering

D. 802.1x

Answer: C

Question No: 527 – (Topic 5)

A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:

Biometric fingerprint scan Complex 12 character password 5 digit pin code authorization

Randomized security question prompt upon login

Which of the following security setups does this company employ?

  1. Single factor authentication

  2. Three factor authentication

  3. Two factor authentication

  4. Single sign-on

Answer: C

Question No: 528 – (Topic 5)

Which of the following security devices is used in providing packet and MAC address filtering services for the network?

  1. Host-based proxy server

  2. Network-based firewall

  3. IDS

  4. IPS

Answer: B

Question No: 529 – (Topic 5)

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

  1. Decreasing radio strength

  2. MAC filtering

  3. WEP encryption

  4. SSID broadcast disable

Answer: A

Question No: 530 – (Topic 5)

Sandy, an administrator, determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

  1. DDoS

  2. Viruses

  3. Worms

  4. Man-in-the-middle

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.