[Free] 2018(June) Dumps4cert CompTIA JK0-023 Dumps with VCE and PDF Download 561-570

By | July 3, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 561 – (Topic 5)

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

  1. Allow TCP port 23

  2. Allow TCP port 25

  3. Allow TCP port 110

  4. Allow UDP port 25

  5. Allow UDP port 110

Answer: B,C

Question No: 562 – (Topic 5)

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

  1. Man-in-the-middle

  2. Social engineering

  3. Phishing

  4. DoS

Answer: A

Question No: 563 – (Topic 5)

An attack used to find unencrypted information in network traffic is called:

  1. WEP cracking.

  2. Packet sniffing.

  3. Ping sweep.

  4. Social engineering.

Answer: B

Question No: 564 – (Topic 5)

Honeypots and honeynets are different in which of the following ways?

  1. Honeynets are managed collections of honeypots.

  2. Honeypots only test software security, not hardware.

  3. Honeynets require specialized hardware to implement.

  4. Honeypots are usually servers and honeynets are routers and switches.

Answer: A

Question No: 565 – (Topic 5)

An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?

  1. Packet filtering

  2. Spam filtering

  3. MAC filtering

  4. CSU

Answer: A

Question No: 566 – (Topic 5)

PKI is a method of user authentication which uses which of the following?

  1. Various router commands

  2. Access control lists

  3. Certificate services

  4. A RADIUS server

Answer: C

Question No: 567 – (Topic 5)

Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?

  1. Host based IPS

  2. Network based firewall

  3. Signature based IDS

  4. Behavior based IPS

Answer: C

Question No: 568 – (Topic 5)

Which of the following protocols is used by Windows to securely access a remote computer?

  1. RAS

  2. Telnet

  3. PPP

  4. RDP

Answer: D

Question No: 569 – (Topic 5)

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

  1. SSL

  2. IPSec

  3. Kerberos

  4. RDP

  5. L2TP

  6. PPTP

Answer: B,E

Question No: 570 – (Topic 5)

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

  1. NetBIOS name filtering

  2. IP address filtering

  3. MAC address filtering

  4. Computer name filtering

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.