[Free] 2018(June) Dumps4cert CompTIA JK0-023 Dumps with VCE and PDF Download 531-540

By | July 3, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 531 – (Topic 5)

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

  1. Honeynet

  2. Honeypot

  3. Vulnerability scanner

  4. Network based IDS

Answer: A

Question No: 532 – (Topic 5)

Stateful packet inspection is a security technology used by which of the following devices?

  1. Unmanaged switch

  2. Hardware firewall

  3. Bridge

  4. IDS

Answer: B

Question No: 533 – (Topic 5)

Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?

  1. DNS

  2. NAT

  3. PKI

  4. RAS

Answer: B

Question No: 534 – (Topic 5)

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?

  1. Decrease signal strength on the antenna

  2. Change the wireless channel on the WAP

  3. Change the device placement to further obfuscate the signal

  4. Set up encryption on the WAP and clients

Answer: D

Question No: 535 – (Topic 5)

A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request?

  1. MAC filtering

  2. IP filtering

  3. Port filtering

  4. Content filtering

Answer: C

Question No: 536 – (Topic 5)

Which of the following will a firewall NOT protect the network from?

  1. Intrusion

  2. DDoS

  3. Denial of Service

  4. Spam e-mails

Answer: D

Question No: 537 – (Topic 5)

A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?

  1. SSID disable

  2. ACL rules

  3. WPA encryption

  4. MAC filtering

Answer: D

Question No: 538 – (Topic 5)

A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause

of the error?

  1. Implicit deny

  2. HTTP transports over UDP

  3. Website is down

  4. DNS server failure

Answer: A

Question No: 539 – (Topic 5)

Which of the following uses SSL encryption?

  1. SMTP

  2. FTP

  3. HTTPS

  4. SNMP

Answer: C

Question No: 540 – (Topic 5)

Which of the following is a social engineering attack?

  1. Worms

  2. Man-in-the-middle

  3. Phishing

  4. Evil twin

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.