Which of the following is an example of asymmetric encrypton?
A. PKI
B. SHA1
C. AES
D. 3DES
A network administrator is considering implementaton of network access restrictons based upon layer two addressing informaton. Which of the following describes this method of network restrictons?
A. MAC fltering
B. Port fltering
C. IP fltering
D. ACL fltering
Which of the following security protocols would BEST protect a connecton to a remote email server and ensure full integrity of all transmited email communicaton?
A. TLS 1.2
B. SNMPv3
C. WPA2
D. SMTP
Which of the following should be mitgated by employing proper coding techniques when developing sofware?
A. Distributed denial of service atacks
B. Bufer overfows
C. War driving
D. Packet snifng
Which of the following security appliances would be used to only analyie trafc and send alerts when predefned paterns of unauthoriied trafc are detected on the network?
A. Host based IPS
B. Network based frewall
C. Signature based IDS
D. Behavior based IPS
A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthoriied devices from connectng to a network switch?
A. Implement 802.11i on all switches in the network.
B. Implement port security on all computers in the company.
C. Implement port security on all switches in the network.
D. Implement rules on the frewall to block unknown devices.
A SOHO had their wireless network breached on several occasions. The user turned of the SSID and enabled WEP encryptonf but breaches are stll occurring. Which of the following will improve security and MOST likely prevent future breaches?
A. Turn down the signal strength
B. Replace the WAP and enable WEP
C. Change both the SSID and WEP key
D. Enable WPA2 encrypton
Which of the following atack types is being used if the originatng IP address has been spoofed?
A. Ping food
B. Trojan
C. Smurf
D. Worm
An organiiaton only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network frewall to ensure connectvity?
A. Forwarding proxy
B. Port address translaton
C. DMZ port security
D. Applicaton inspecton
Which of the following authentcaton methods is MOST secure?
A. NTLM
B. CHAP
C. MS-CHAP
D. Kerberos
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.