A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employeesn wireless device locatons via WAP triangulaton. Which of the following is the MOST important aspect of the deployment?
A. WAP placement
B. TX/RX channel
C. Signal strength
D. Transmission power
Which of the following provides RSA encrypton at the session layer?
A. SSH
B. ISAKMP
C. SSL
D. TLS
The company is setng up a new website that will be requiring a lot of interacton with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be confgured on the frewall?
A. PAT
B. DHCP
C. DMZ
D. NAT
A network administrator is implementng an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?
A. Honeynet
B. Signature based IPS
C. Behavior based IPS
D. Host based IPS
An administrator wants to restrict trafc to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
A. An IP fltering ACL
B. A MAC fltering ACL
C. A port fltering ACL
D. A class matching ACL
An administrator confguring remote access opens ports 500/UDP and 10000/UDP on the frewall. Which of the following services are MOST likely being allowed? (Select TWO).
A. SSL
B. IPSec
C. Kerberos
D. RDP
E. L2TP
F. PPTP
A network administrator must ensure that both the server and the client are authentcated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
A. EAP-LEAP
B. MAC ACL
C. EAP-TTLS
D. MS-CHAPv2
A company needs to implement a secure wireless system that would require employees to authentcate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).
A. 802.1q
B. MAC address fltering
C. WPA2 Personal
D. WPA Enterprise
E. 802.1x
A network technician is concerned that an atacker is atemptng to penetrate the networkf and wants to set a rule on the frewall to prevent the atacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
A. TCP
B. SMTP
C. ICMP
D. ARP
The security measure used to reduce vulnerabilites for MOST network devices that require regular applicaton and monitoring is:
A. Patch management.
B. Security limitatons.
C. Documentaton.
D. Social engineering.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.