Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!
CompTIA Network certification
Question No: 561 – (Topic 5)
An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).
-
Allow TCP port 23
-
Allow TCP port 25
-
Allow TCP port 110
-
Allow UDP port 25
-
Allow UDP port 110
Answer: B,C
Question No: 562 – (Topic 5)
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
-
Man-in-the-middle
-
Social engineering
-
Phishing
-
DoS
Answer: A
Question No: 563 – (Topic 5)
An attack used to find unencrypted information in network traffic is called:
-
WEP cracking.
-
Packet sniffing.
-
Ping sweep.
-
Social engineering.
Answer: B
Question No: 564 – (Topic 5)
Honeypots and honeynets are different in which of the following ways?
-
Honeynets are managed collections of honeypots.
-
Honeypots only test software security, not hardware.
-
Honeynets require specialized hardware to implement.
-
Honeypots are usually servers and honeynets are routers and switches.
Answer: A
Question No: 565 – (Topic 5)
An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?
-
Packet filtering
-
Spam filtering
-
MAC filtering
-
CSU
Answer: A
Question No: 566 – (Topic 5)
PKI is a method of user authentication which uses which of the following?
-
Various router commands
-
Access control lists
-
Certificate services
-
A RADIUS server
Answer: C
Question No: 567 – (Topic 5)
Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?
-
Host based IPS
-
Network based firewall
-
Signature based IDS
-
Behavior based IPS
Answer: C
Question No: 568 – (Topic 5)
Which of the following protocols is used by Windows to securely access a remote computer?
-
RAS
-
Telnet
-
PPP
-
RDP
Answer: D
Question No: 569 – (Topic 5)
An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).
-
SSL
-
IPSec
-
Kerberos
-
RDP
-
L2TP
-
PPTP
Answer: B,E
Question No: 570 – (Topic 5)
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
-
NetBIOS name filtering
-
IP address filtering
-
MAC address filtering
-
Computer name filtering
Answer: C
100% Dumps4cert Free Download!
–JK0-023 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-023 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |