The company requires all users to authentcate to the network with a smart cardf a pin numberf and a fngerprint scan. Which of the following BEST describes the user authentcaton being used?
A. Mult-factor authentcaton
B. Two-factor authentcaton
C. Biometrics
D. Single sign-on
Which of the following would a network administrator use to scan a network for vulnerabilites?
A. ICMP
B. NMAP
C. ACL
D. TCPDUMP
A network administrator wishes to limit the number of potental wireless clients to 20 on a specifc AP. Which of the following setngs needs to be changed?
A. The network address translaton IP range.
B. The signal strength of the router.
C. The DCHP lease tme.
D. The number of allowable MAC addresses.
Which of the following would be used in a frewall to block incoming TCP packets that are not from established connectons?
A. Access control lists
B. Port address translaton
C. Blocking unauthoriied ports
D. Stateful inspecton
PKI is a method of user authentcaton which uses which of the following?
A. Various router commands
B. Access control lists
C. Certfcate services
D. A RADIUS server
Which of the following is a social engineering atack?
A. Worms
B. Man-in-the-middle
C. Phishing
D. Evil twin
Karenf an administratorf would like to inspect all trafc fowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).
A. Packet snifer
B. Honeypot
C. Port mirroring
D. IPS
E. Port scanner
F. IDS
Sandyf an administratorf determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following atacks?
A. DDoS
B. Viruses
C. Worms
D. Man-in-the-middle
An organiiaton recently installed a frewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the frewall be confgured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
Which of the following will a frewall NOT protect the network from?
A. Intrusion
B. DDoS
C. Denial of Service
D. Spam e-mails
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.