Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
JK0-023 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Braindumps CompTIA JK0-023 Dumps with VCE and PDF 561-570

September 18, 2017

EnsurePass
2017 Sep CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/JK0-023.html

CompTIA Network certification

Question No: 561 – (Topic 5)

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

  1. Allow TCP port 23

  2. Allow TCP port 25

  3. Allow TCP port 110

  4. Allow UDP port 25

  5. Allow UDP port 110

Answer: B,C

Question No: 562 – (Topic 5)

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

  1. Man-in-the-middle

  2. Social engineering

  3. Phishing

  4. DoS

Answer: A

Question No: 563 – (Topic 5)

An attack used to find unencrypted information in network traffic is called:

  1. WEP cracking.

  2. Packet sniffing.

  3. Ping sweep.

  4. Social engineering.

Answer: B

Question No: 564 – (Topic 5)

Honeypots and honeynets are different in which of the following ways?

  1. Honeynets are managed collections of honeypots.

  2. Honeypots only test software security, not hardware.

  3. Honeynets require specialized hardware to implement.

  4. Honeypots are usually servers and honeynets are routers and switches.

Answer: A

Question No: 565 – (Topic 5)

An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?

  1. Packet filtering

  2. Spam filtering

  3. MAC filtering

  4. CSU

Answer: A

Question No: 566 – (Topic 5)

PKI is a method of user authentication which uses which of the following?

  1. Various router commands

  2. Access control lists

  3. Certificate services

  4. A RADIUS server

Answer: C

Question No: 567 – (Topic 5)

Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?

  1. Host based IPS

  2. Network based firewall

  3. Signature based IDS

  4. Behavior based IPS

Answer: C

Question No: 568 – (Topic 5)

Which of the following protocols is used by Windows to securely access a remote computer?

  1. RAS

  2. Telnet

  3. PPP

  4. RDP

Answer: D

Question No: 569 – (Topic 5)

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

  1. SSL

  2. IPSec

  3. Kerberos

  4. RDP

  5. L2TP

  6. PPTP

Answer: B,E

Question No: 570 – (Topic 5)

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

  1. NetBIOS name filtering

  2. IP address filtering

  3. MAC address filtering

  4. Computer name filtering

Answer: C

100% Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass JK0-023 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE