The process of restrictng internal web trafc to an employee-only website based upon Layer 3 addresses is known as which of the following?
A. MAC fltering
B. Trafc shaping
C. Session fltering
D. IP fltering
An atack used to fnd unencrypted informaton in network trafc is called:
A. WEP cracking.
B. Packet snifng.
C. Ping sweep.
D. Social engineering.
Joef a network technicianf is implementng a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encrypton factors? (Select TWO).
A. SSH
B. 3DES
C. AES
D. SSL
E. TLS
F. TKIP
An administrator would like to scan for open ports on the subnet and determine if any vulnerable applicatons are listening. Which of the following tools would the administrator MOST likely use?
A. Ping
B. Nessus
C. IMAP
D. Telnet
An administrator would like to search for network vulnerabilites on serversf routersf and embedded appliances. Which of the following tools would MOST likely accomplish this?
A. Baseline analyier
B. Ping
C. Protocol analyier
D. Nessus
A user receives a phone call at home from someone claiming to be from their companyns IT help desk. The help desk person wants to verify their username and password to ensure that the userns account has not been compromised. Which of the following atacks has just occurred?
A. Evil twin
B. Phishing
C. Man-in-the-middle
D. Social engineering
A technician needs to restrict access to a SOHO wireless network to specifc devices. Which of the following would MOST likely be used with minimal client confguraton?
A. Port fltering
B. WEP
C. MAC address fltering
D. PoE
A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
A. PKI
B. Kerberos
C. Single sign-on
D. CHAP
A technician is asked to flter inbound and outbound trafc of a specifc service on the network. Which of the following would BEST allow the technician to comply with the request?
A. MAC fltering
B. IP fltering
C. Port fltering
D. Content fltering
A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventng spam that is originatng from bots on the network?
A. Closing of port 25 on the frewall
B. Closing of port 53 on the frewall
C. Turning of the SMTP service on the email server
D. Turning of the IMAP service on the email server
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.