[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 111-120

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 111 – (Topic 1)

Which of the following ports and protocol types must be opened on a host with a host- based firewall to allow incoming SFTP connections?

  1. 21/UDP

  2. 21/TCP

  3. 22/UDP

  4. 22/TCP

Answer: D Explanation:

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22.

Question No: 112 – (Topic 1)

A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.

Which of the following is MOST likely the reason for the sub-interfaces?

  1. The network uses the subnet of

  2. The switch has several VLANs configured on it.

  3. The sub-interfaces are configured for VoIP traffic.

  4. The sub-interfaces each implement quality of service.

Answer: B Explanation:

A subinterface is a division of one physical interface into multiple logical interfaces. Routers commonly employ subinterfaces for a variety of purposes, most common of these are for routing traffic between VLANs. Also, IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network.

Question No: 113 – (Topic 1)

A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following protocols should be used instead of Telnet?

  1. SCP

  2. SSH

  3. SFTP

  4. SSL

Answer: B Explanation:

SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet transmits both authentication credentials and data in clear text.

Question No: 114 – (Topic 1)

A network administrator needs to provide daily network usage reports on all layer 3 devices without compromising any data while gathering the information. Which of the following would be configured to provide these reports?

  1. SNMP

  2. SNMPv3

  3. ICMP

  4. SSH

Answer: B Explanation:

Currently, SNMP is predominantly used for monitoring and performance management. SNMPv3 defines a secure version of SNMP and also facilitates remote configuration of the SNMP entities.

Question No: 115 – (Topic 1)

Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?

  1. Single sign on

  2. IPv6

  3. Secure zone transfers

  4. VoIP

Answer: C Explanation:

C: A primary DNS server has the quot;master copyquot; of a zone, and secondary DNS servers keep copies of the zone for redundancy. When changes are made to zone data on the primary DNS server, these changes must be distributed to the secondary DNS servers for the zone. This is done through zone transfers. If you allow zone transfers to any server, all the resource records in the zone are viewable by any host that can contact your DNS server. Thus you will need to secure the zone transfers to stop an attacker from mapping out your addresses and devices on your network.

Question No: 116 – (Topic 1)

Which the following flags are used to establish a TCP connection? (Select TWO).

  1. PSH

  2. ACK

  3. SYN

  4. URG

  5. FIN

Answer: B,C Explanation:

To establish a TCP connection, the three-way (or 3-step) handshake occurs:

SYN: The active open is performed by the client sending a SYN to the server. The client sets the segment#39;s sequence number to a random value A.

SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number i.e. A 1, and the sequence number that the server chooses for the packet is another random number, B.

ACK: Finally, the client sends an ACK back to the server. The sequence number is set to the received acknowledgement value i.e. A 1, and the acknowledgement number is set to

one more than the received sequence number i.e. B 1.

Question No: 117 – (Topic 1)

Due to limited resources, a company must reduce their hardware budget while still maintaining availability. Which of the following would MOST likely help them achieve their objectives?

  1. Virtualization

  2. Remote access

  3. Network access control

  4. Blade servers

Answer: A Explanation:

Because Virtualization allows a single set of hardware to host multiple virtual machines, it requires less hardware to maintain the current scenario.

Question No: 118 – (Topic 1)

Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?

  1. Protocol filter

  2. Load balancer

  3. NIDS

  4. Layer 7 firewall

Answer: D Explanation:

An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted. This type of firewall operates at the Application layer (Layer 7) of the OSI model.

Question No: 119 – (Topic 1)

The server administrator has noted that most servers have a lot of free disk space and low memory utilization. Which of the following statements will be correct if the server administrator migrates to a virtual server environment?

  1. The administrator will need to deploy load balancing and clustering.

  2. The administrator may spend more on licensing but less on hardware and equipment.

  3. The administrator will not be able to add a test virtual environment in the data center.

  4. Servers will encounter latency and lowered throughput issues.

Answer: B Explanation:

Migrating to a virtual server environment reduces cost by eliminating the need to purchase, manage, maintain and power physical machines. The fewer physical machines you have, the less money it costs.

Question No: 120 – (Topic 1)

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?

  1. Unified Threat Management

  2. Virtual Private Network

  3. Single sign on

  4. Role-based management

Answer: A Explanation:

When you combine a firewall with other abilities (intrusion prevention, antivirus, content filtering, etc.), what used to be called an all-in-one appliance is now known as a unified threat management (UTM) system. The advantages of combining everything into one include a reduced learning curve (you only have one product to learn), a single vendor to deal with, and-typically-reduced complexity.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com