A network technician has confgured a new frewall with a rule to deny UDP trafc. Users have reported that they are unable to access Internet websites. The technician verifes this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
A. Implicit deny
B. HTTP transports over UDP
C. Website is down
D. DNS server failure
A network technician is setng up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACLf which of the following would be fltered to ensure only the authoriied laptop can access the WAP?
A. NetBIOS name fltering
B. IP address fltering
C. MAC address fltering
D. Computer name fltering
A network administrator is looking to implement a soluton allowing users to utliie a common password to access most network resources for an organiiaton. Which of the following would BEST provide this functonality?
A. RADIUS
B. Single sign on
C. Multfactor authentcaton
D. Two-factor authentcaton
The security administrator needs to restrict specifc devices from connectng to certain WAPs. Which of the following security measures would BEST fulfll this need?
A. WAP placement
B. MAC address fltering
C. Content fltering
D. Encrypton type and strength
A user is connectng to the Internet at an airport through an ad-hoc connecton. Which of the following is the MOST likely security threat?
A. Man-in-the-middle
B. Social engineering
C. Phishing
D. DoS
A network administrator is performing a penetraton test on the WPA2 wireless network. Which of the following can be used to fnd the key?
A. DoS
B. Bufer overfow
C. Dictonary fle
D. SQL injecton
A system administrator is implementng an IDS on the database server to see who is trying to access the server. The administrator relies on the sofware provider for what to detect. Which of the following would MOST likely be installed?
A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
D. Honeypot
A technician is troubleshootng authentcaton issues on a server. It turns out the clock on the server was 72 minutes behind. Setng the clock to the correct tme fxed the issue. Given the scenariof which of the following authentcaton methods was being used?
A. Kerberos
B. CHAP
C. TACACS+
D. RADIUS
Which of the following will BEST block a host from accessing the LAN on a network using statc IP addresses?
A. IP fltering
B. Port fltering
C. MAC address fltering
D. DHCP lease
Which of the following uses SSL encrypton?
A. SMTP
B. FTP
C. HTTPS
D. SNMP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.