Which of the following capabilites of a frewall allows Zachf an administratorf to block trafc based on key words determined by the company?
A. Stateless trafc monitor
B. Stateful trafc monitor
C. Signature identfcaton
D. Content flter
Which of the following is an authentcatonf authoriiatonf and accountng method that provides administratve access to network devices?
A. PKI
B. TACACS+
C. CHAP D. SSH
Jeff a company executvef has notced that a wireless network signal from the companyns WAP can be seen in the companyns parking lot. Jef is very worried that this is a potental security threat. Which of the following can be done to eliminate this threat?
A. Implement WEP encrypton
B. Decrease signal strength
C. Change wireless channels
D. Rotate the SSID daily
A company has only three laptops that connect to their wireless network. The company is currently using WEP encrypton on their wireless network. They have notced unauthoriied connectons on their WAP and want to secure their wireless connecton to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).
A. Change the encrypton method to WPA
B. Limit the DHCP scope to only have three addresses total
C. Enable the SSID broadcast
D. Enable and confgure MAC fltering
E. Change the broadcast channel to a less commonly used channel
Lisaf a network administratorf needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the frewall? (Select TWO).
A. 23
B. 25
C. 53
D. 80
E. 443
Zachf an administratorf wants to eliminate remote access to a network from all usersf except those users in Zachns own country. Which of the following security measures could he use to set up this functonality?
A. MAC fltering
B. Port fltering
C. IP fltering
D. TLS
A frewall that examines all the incoming trafc and decides if the trafc is going to be allowed though or dumped is a example of which of the following?
A. Packet snifng
B. Packet flter
C. Stateful inspecton
D. Content flter
Which of the following would be used to test out the security of a specifc network by allowing it to receive security atacks?
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
Users are unable to access the companyns intranet website. Which of the following atacks has the network MOST likely experienced?
A. Man-in-the-middle
B. Smurf
C. Trojan
D. DoS
Which of the following performs posture assessments for unknown devices that connect to the network?
A. PKI
B. EAP
C. NAC
D. AAA
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.