Which of the following network tools is used to identfy running services on host devices?
A. IDS
B. IPS
C. Firewall
D. NMAP
Which of the following atacks creates a bufer overfow to stop access to a system?
A. Blue jacking
B. DoS
C. Netstat
D. Man-in-the-middle
An organiiaton recently installed a frewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the frewall be confgured? (Select TWO).
A. Allow TCP port 23
B. Allow TCP port 25
C. Allow TCP port 110
D. Allow UDP port 25
E. Allow UDP port 110
Afer installing a SOHO wireless routerf Joef the network administratorf notces that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the routerns public interface IP address. Which of the following must Joe implement to assign a diferent public IP from the routerns public interface IP address to one of the workstatons in the ofce?
A. NAT
B. PAT
C. DMZ
D. ACL
Sandyf an administratorf must connect to a remote UNIX server securely. Which of the following would be the MOST secure connecton method?
A. FTP
B. PPP
C. Telnet
D. SSH
A company wishes to have a wireless signal broadcast only through a specifc stretch of a highway tunnel. Which of the following measures will accomplish this?
A. WPA encrypton
B. MAC fltering
C. Changing antenna type
D. Decreasing radio strength
Sandyf a home userf wishes to confne a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
A. Decreasing radio strength
B. MAC fltering
C. WEP encrypton
D. SSID broadcast disable
Joef a network administratorf needs to forward HTTP trafc from a SOHO frewall public IP to the internal web serverns private IP. Which of the following can Joe implement?
A. DNS
B. NAT
C. PKI
D. RAS
Before installing a wireless networkf which of the following should Karenf a network technicianf take into consideraton to reduce signal exposure for war drivers?
A. Device placement
B. MAC address fltering
C. User authentcaton
D. Encrypton protocols
Which of the following is the MOST secure way to prevent malicious changes to a frewall?
A. SNMPv2 access only
B. TELNET access only
C. SSH access only
D. Console access only
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.