Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!
CompTIA Network certification
Question No: 581 – (Topic 5)
A user at a hotel sees two SSIDs; both are called quot;HotelWirelessquot;. After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?
-
Man-in-the-middle
-
DDoS
-
Evil twin
-
War driving
Answer: C
Question No: 582 – (Topic 5)
Which of the following would be the BEST solution for an IDS to monitor known attacks?
-
Host-based
-
Signature-based
-
Network-based
-
Behavior-based
Answer: B
Question No: 583 – (Topic 5)
Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?
-
Managed
-
Software
-
Hardware
-
Wireless
Answer: B
Question No: 584 – (Topic 5)
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?
-
Packet sniffing
-
Packet filter
-
Stateful inspection
-
Content filter
Answer: C
Question No: 585 – (Topic 5)
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?
-
Single sign-on
-
Network access control
-
PKI authentication
-
Two-factor authentication
Answer: D
Question No: 586 – (Topic 5)
A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?
-
MAC filtering
-
Port filtering
-
IP filtering
-
ACL filtering
Answer: A
Question No: 587 – (Topic 5)
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?
-
WPA encryption
-
MAC filtering
-
Changing antenna type
-
Decreasing radio strength
Answer: C
Question No: 588 – (Topic 5)
A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?
-
Stateful inspection
-
WEP
-
WPA
-
Open with EAP
Answer: C
Question No: 589 – (Topic 5)
Which of the following is needed when using WPA2-Enterprise wireless encryption?
-
TFTP
-
RADIUS
-
LDAP
-
IPSec
Answer: B
Question No: 590 – (Topic 5)
Which of the following tools will scan a network for hosts and provide information on the installed operating system?
-
DOCSIS
-
NMAP
-
IMAP
-
BERT
Answer: B
100% Dumps4cert Free Download!
–Download Free Demo:JK0-023 Demo PDF
100% Dumps4cert Pass Guaranteed!
–JK0-023 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |