[Free] 2018(June) Dumps4cert CompTIA JK0-023 Dumps with VCE and PDF Download 581-590

By | July 3, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 581 – (Topic 5)

A user at a hotel sees two SSIDs; both are called quot;HotelWirelessquot;. After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?

  1. Man-in-the-middle

  2. DDoS

  3. Evil twin

  4. War driving

Answer: C

Question No: 582 – (Topic 5)

Which of the following would be the BEST solution for an IDS to monitor known attacks?

  1. Host-based

  2. Signature-based

  3. Network-based

  4. Behavior-based

Answer: B

Question No: 583 – (Topic 5)

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?

  1. Managed

  2. Software

  3. Hardware

  4. Wireless

Answer: B

Question No: 584 – (Topic 5)

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?

  1. Packet sniffing

  2. Packet filter

  3. Stateful inspection

  4. Content filter

Answer: C

Question No: 585 – (Topic 5)

A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?

  1. Single sign-on

  2. Network access control

  3. PKI authentication

  4. Two-factor authentication

Answer: D

Question No: 586 – (Topic 5)

A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?

  1. MAC filtering

  2. Port filtering

  3. IP filtering

  4. ACL filtering

Answer: A

Question No: 587 – (Topic 5)

A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?

  1. WPA encryption

  2. MAC filtering

  3. Changing antenna type

  4. Decreasing radio strength

Answer: C

Question No: 588 – (Topic 5)

A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?

  1. Stateful inspection

  2. WEP

  3. WPA

  4. Open with EAP

Answer: C

Question No: 589 – (Topic 5)

Which of the following is needed when using WPA2-Enterprise wireless encryption?

  1. TFTP


  3. LDAP

  4. IPSec

Answer: B

Question No: 590 – (Topic 5)

Which of the following tools will scan a network for hosts and provide information on the installed operating system?


  2. NMAP

  3. IMAP

  4. BERT

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-023 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.