Which of the following security devices can receive and process HTTP requests from hosts to allow or deny trafc for web browsing purposes only?
A. Load balancer
B. VPN concentrator
C. Proxy server
D. DNS server
A content flter is MOST likely installed on which of the following servers?
A. Proxy server
B. TACACS+ server
C. DNS server
D. DHCP server
An administrator edits the network frewall confguraton. Afer editng the confguratonf the administrator logs the date and tme of the edit and why it was performed in the frewall documentaton. Which of the following BEST describes these actons?
A. Asset management
B. Baselines
C. Network maps
D. Change management
A technician wants to send management informaton from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used?
A. SNMPv3
B. FTP
C. TFTP
D. Telnet
A company has been just opened a new site in another country. Both sites share informaton across the WAN contnuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?
A. Trafc shaping
B. QoS
C. Caching engines
D. High availability
An IT manager is looking for a soluton that can easily trace back suspicious Internet browsing to partcular users at a company. Which of the following can BEST provide this functonality?
A. Layer 3 managed switch
B. VPN concentrator
C. Load balancer
D. Content flter
A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?
A. NIC bonding
B. Proxy server
C. Firewall ACLs
D. VLANs
Which of the following protocols could the below packet capture be from? Port: 161 msgVersion:
msgUsername:
msgAuthentcatonParameters:
msgPrivacyParameters:
msgData:
data: get-request
request-id:
error-status: noError (0)
error-index: 0
variable-bindings: 0 items
A. SNMPv3
B. SSH
C. HTTP
D. SNMPv1
Which of the following tools would BEST be used to verify if a network cable is properly terminated?
A. Multmeter
B. Cable certfer
C. Toner probe
D. Cable stripper
Karenf an administratorf wants to verify which protocols are in use on the network. Which of the following tools should she use?
A. Intrusion detecton sofware
B. PoE
C. Packet snifer
D. Intrusion preventon sofware
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.