[Free] 2018(May) EnsurePass Dumpsleader CompTIA JK0-023 Dumps with VCE and PDF 491-500

Ensurepass.com : Ensure you pass the IT Exams
2018 May CompTIA Official New Released JK0-023
100% Free Download! 100% Pass Guaranteed!

CompTIA Network certification

Question No: 491 – (Topic 5)

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

  1. TCP

  2. SMTP

  3. ICMP

  4. ARP

Answer: C

Question No: 492 – (Topic 5)

Which of the following can function in an unsecure mode?

  1. SNMPv3

  2. SSH

  3. SSL

  4. SCP

Answer: A

Question No: 493 – (Topic 5)

Which of the following would a network administrator use to scan a network for vulnerabilities?

  1. ICMP

  2. NMAP

  3. ACL


Answer: B

Question No: 494 – (Topic 5)

Which of the following is an example of two-factor authentication?

  1. A username and PIN

  2. A username and password

  3. A username, password, finger print scan, and smart card

  4. A username, password, and key fob number

Answer: D

Question No: 495 – (Topic 5)

The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:

  1. Patch management.

  2. Security limitations.

  3. Documentation.

  4. Social engineering.

Answer: A

Question No: 496 – (Topic 5)

After installing a SOHO wireless router, Joe, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s public interface IP address. Which of the following must Joe implement to assign a different public IP from the router’s public interface IP address to one of the workstations in the office?

  1. NAT

  2. PAT

  3. DMZ

  4. ACL

Answer: A

Question No: 497 – (Topic 5)

Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?

  1. Implement WEP encryption

  2. Decrease signal strength

  3. Change wireless channels

  4. Rotate the SSID daily

Answer: B

Question No: 498 – (Topic 5)

The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following?

  1. MAC filtering

  2. Traffic shaping

  3. Session filtering

  4. IP filtering

Answer: D

Question No: 499 – (Topic 5)

Which of the following tools could attempt to detect operating system vulnerabilities?

  1. nslookup

  2. honeynet

  3. netstat

  4. nessus

Answer: D

Question No: 500 – (Topic 5)

Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?

  1. Intrusion prevention software

  2. Packet sniffer

  3. Intrusion detection software

  4. Port scanner

Answer: B

100% Ensurepass Free Download!
Download Free Demo:JK0-023 Demo PDF
100% Ensurepass Free Guaranteed!
JK0-023 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No
Tagged , , , , , , , , , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *