[Free] 2018(Jan) Dumps4cert Testinsides CompTIA JK0-022 Dumps with VCE and PDF 171-180
Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-022.html
CompTIA Academic/E2C Security Certification Exam Voucher Only
Question No: 171 – (Topic 1)
A company’s business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following network elements would be used to support the new business model?
-
Software as a Service
-
DMZ
-
Remote access support
-
Infrastructure as a Service
Answer: A Explanation:
Software as a Service (SaaS) allows for on-demand online access to specific software applications or suites without having to install it locally. This will allow the data center to continue providing network and security services.
Question No: 172 – (Topic 1)
Which of the following network design elements allows for many internal devices to share one public IP address?
-
DNAT
-
PAT
-
DNS
-
DMZ
Answer: B Explanation:
Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.
Most home networks use PAT. In such a scenario, the Internet Service Provider (ISP) assigns a single IP address to the home network#39;s router. When Computer X logs on the Internet, the router assigns the client a port number, which is appended to the internal IP address. This, in effect, gives Computer X a unique address. If Computer Z logs on the Internet at the same time, the router assigns it the same local IP address with a different port number. Although both computers are sharing the same public IP address and accessing the Internet at the same time, the router knows exactly which computer to send specific packets to because each computer has a unique internal address.
Question No: 173 – (Topic 1)
A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner. Which of the following protocol would be MOST appropriate?
-
HTTPS
-
SSH
-
FTP
-
TLS
Answer: D
Explanation: Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering.
Question No: 174 – (Topic 1)
Which of the following should be performed to increase the availability of IP telephony by prioritizing traffic?
-
Subnetting
-
NAT
-
Quality of service
-
NAC
Answer: C Explanation:
Quality of Service (QoS) facilitates the deployment of media-rich applications, such as video conferencing and Internet Protocol (IP) telephony, without adversely affecting network throughput.
Question No: 175 – (Topic 1)
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete’s access to this site?
-
Internet content filter
-
Firewall
-
Proxy server
-
Protocol analyzer
Answer: A
Explanation:
Web filtering software is designed to restrict or control the content a reader is authorised to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means.
Question No: 176 – (Topic 1)
A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario?
-
WPA2
-
WPA
-
IPv6
-
IPv4
Answer: C Explanation:
IPSec security is built into IPv6.
Question No: 177 – (Topic 1)
A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO).
-
TCP 21
-
TCP 23
-
TCP 53
-
UDP 23
-
UDP 53
Answer: C,E Explanation:
DNS uses TCP and UDP port 53. TCP port 53 is used for zone transfers, whereas UDP port 53 is used for queries.
Question No: 178 – (Topic 1)
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?
Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
A. /24 B. /27 C. /28 D. /29 E. /30
Answer: D Explanation:
Using this option will result in all three servers using host addresses on different broadcast domains.
Question No: 179 – (Topic 1)
The security administrator at ABC company received the following log information from an external party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?
-
A NIDS was used in place of a NIPS.
-
The log is not in UTC.
-
The external party uses a firewall.
-
ABC company uses PAT.
Answer: D Explanation:
PAT would ensure that computers on ABC’s LAN translate to the same IP address, but with a different port number assignment. The log information shows the IP address, not the port number, making it impossible to pin point the exact source.
Question No: 180 – (Topic 1)
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:
-
Redundant systems.
-
Separation of duties.
-
Layered security.
-
Application control.
Answer: C Explanation:
Layered security is the practice of combining multiple mitigating security controls to protect resources and data.
Topic 2, Compliance and Operational Security
100% Dumps4cert Free Download!
–Download Free Demo:JK0-022 Demo PDF
100% Dumps4cert Free Guaranteed!
–JK0-022 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF