[Free] 2018(Jan) Dumps4cert Testinsides CompTIA JK0-022 Dumps with VCE and PDF 81-90
Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-022.html
CompTIA Academic/E2C Security Certification Exam Voucher Only
Question No: 81 – (Topic 1)
After a new firewall has been installed, devices cannot obtain a new IP address. Which of the following ports should Matt, the security administrator, open on the firewall?
-
25
-
68
-
80
D. 443
Answer: B Explanation:
The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for distributing IP addresses for interfaces and services. DHCP makes use of port 68.
Question No: 82 – (Topic 1)
The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to the sports site on this phone. Which of the following might the administrator need to configure?
-
The access rules on the IDS
-
The pop up blocker in the employee’s browser
-
The sensitivity level of the spam filter
-
The default block page on the URL filter
Answer: D Explanation:
A URL filter is used to block access to a site based on all or part of a URL. There are a number of URL-filtering tools that can acquire updated master URL block lists from vendors, as well as allow administrators to add or remove URLs from a custom list.
Question No: 83 – (Topic 1)
A company determines a need for additional protection from rogue devices plugging into physical ports around the building.
Which of the following provides the highest degree of protection from unauthorized wired network access?
-
Intrusion Prevention Systems
-
MAC filtering
-
Flood guards
D. 802.1x
Answer: D Explanation:
IEEE 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless devices connecting to a LAN or WLAN.
Question No: 84 – (Topic 1)
NO: 36
Sara, a security technician, has received notice that a vendor coming in for a presentation will require access to a server outside of the network. Currently, users are only able to access remote sites through a VPN connection. How could Sara BEST accommodate the vendor?
-
Allow incoming IPSec traffic into the vendor’s IP address.
-
Set up a VPN account for the vendor, allowing access to the remote site.
-
Turn off the firewall while the vendor is in the office, allowing access to the remote site.
-
Write a firewall rule to allow the vendor to have access to the remote site.
Answer: D Explanation:
Firewall rules are used to define what traffic is able pass between the firewall and the internal network. Firewall rules block the connection, allow the connection, or allow the connection only if it is secured. Firewall rules can be applied to inbound traffic or outbound traffic and any type of network.
Question No: 85 – (Topic 1)
An IT director is looking to reduce the footprint of their company’s server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?
-
Infrastructure as a Service
-
Storage as a Service
-
Platform as a Service
-
Software as a Service
Answer: A Explanation:
Cloud users install operating-system images and their application software on the cloud infrastructure to deploy their applications. In this model, the cloud user patches and maintains the operating systems and the application software.
Question No: 86 – (Topic 1)
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access?
-
SCP
-
SSH
-
SFTP
-
HTTPS
Answer: B Explanation:
Secure Shell (SSH) is a tunneling protocol originally used on Unix systems. It’s now available for both Unix and Windows environments. SSH is primarily intended for interactive terminal sessions.
SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance.
Question No: 87 – (Topic 1)
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?
-
PAT
-
NAP
-
DNAT
-
NAC
Answer: A Explanation:
Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.
Most home networks use PAT. In such a scenario, the Internet Service Provider (ISP) assigns a single IP address to the home network#39;s router. When Computer X logs on the Internet, the router assigns the client a port number, which is appended to the internal IP address. This, in effect, gives Computer X a unique address. If Computer Z logs on the Internet at the same time, the router assigns it the same local IP address with a different port number. Although both computers are sharing the same public IP address and accessing the Internet at the same time, the router knows exactly which computer to send specific packets to because each computer has a unique internal address.
Question No: 88 – (Topic 1)
A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log:
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
-
LDAP
-
HTTP
-
RDP
-
HTTPS
Answer: C Explanation:
RDP uses TCP port 3389.
Question No: 89 – (Topic 1)
Configuring the mode, encryption methods, and security associations are part of which of the following?
-
IPSec
-
Full disk encryption
C. 802.1x
D. PKI
Answer: A Explanation:
IPSec can operate in tunnel mode or transport mode. It uses symmetric cryptography to provide encryption security. Furthermore, it makes use of Internet Security Association and Key Management Protocol (ISAKMP).
Question No: 90 – (Topic 1)
Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?
-
EAP-MD5
-
WEP
-
PEAP-MSCHAPv2
-
EAP-TLS
Answer: C Explanation:
PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards.
100% Dumps4cert Free Download!
–Download Free Demo:JK0-022 Demo PDF
100% Dumps4cert Free Guaranteed!
–JK0-022 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF