[Free] 2017(Nov) Dumps4cert Testinsides CompTIA JK0-022 Dumps with VCE and PDF Download 141-150

Dumps4cert 2017 Nov CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-022.html

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 141 – (Topic 1)

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?

  1. Implement a virtual firewall

  2. Install HIPS on each VM

  3. Virtual switches with VLANs

  4. Develop a patch management guide

Answer: C Explanation:

A virtual local area network (VLAN) is a hardware-imposed network segmentation created

by switches. VLANs are used for traffic management. VLANs can be used to isolate traffic between network segments.

Question No: 142 – (Topic 1)

An administrator wants to establish a WiFi network using a high gain directional antenna with a narrow radiation pattern to connect two buildings separated by a very long distance. Which of the following antennas would be BEST for this situation?

  1. Dipole

  2. Yagi

  3. Sector

  4. Omni

Answer: B Explanation:

A Yagi-Uda antenna, commonly known simply as a Yagi antenna, is a directional antenna consisting of multiple parallel dipole elements in a line, usually made of metal rods. It consists of a single driven element connected to the transmitter or receiver with a transmission line, and additional parasitic elements: a so-called reflector and one or more directors. The reflector element is slightly longer than the driven dipole, whereas the directors are a little shorter. This design achieves a very substantial increase in the antenna#39;s directionality and gain compared to a simple dipole.

Question No: 143 – (Topic 1)

Which of the following BEST describes the weakness in WEP encryption?

  1. The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.

  2. The WEP key is stored in plain text and split in portions across 224 packets of random data.

    Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.

  3. The WEP key has a weak MD4 hashing algorithm used.

    A simple rainbow table can be used to generate key possibilities due to MD4 collisions.

  4. The WEP key is stored with a very small pool of random numbers to make the cipher text.

As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Answer: D Explanation:

WEP is based on RC4, but due to errors in design and implementation, WEP is weak in a number of areas, two of which are the use of a static common key and poor implementation of initiation vectors (IVs). When the WEP key is discovered, the attacker can join the network and then listen in on all other wireless client communications.

Question No: 144 – (Topic 1)

An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?

  1. TCP/IP

  2. SSL

  3. SCP

  4. SSH

Answer: B Explanation:

SSL (Secure Sockets Layer) is used for establishing an encrypted link between two computers, typically a web server and a browser. SSL is used to enable sensitive information such as login credentials and credit card numbers to be transmitted securely.

Question No: 145 – (Topic 1)

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network.

Which of the following types of technologies will BEST address this scenario?

  1. Application Firewall

  2. Anomaly Based IDS

  3. Proxy Firewall

  4. Signature IDS

Answer: B Explanation:

Anomaly-based detection watches the ongoing activity in the environment and looks for abnormal occurrences. An anomaly-based monitoring or detection method relies on definitions of all valid forms of activity. This database of known valid activity allows the tool to detect any and all anomalies. Anomaly-based detection is commonly used for protocols. Because all the valid and legal forms of a protocol are known and can be defined, any variations from those known valid constructions are seen as anomalies.

Question No: 146 CORRECT TEXT – (Topic 1)

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Answer: Use the following answer for this simulation task.

Explanation:

Dumps4Cert 2017 PDF and VCE

Firewall rules act like ACLs, and they are used to dictate what traffic can pass between the firewall and the internal network. Three possible actions can be taken based on the rule’s criteria:

Block the connection Allow the connection

Allow the connection only if it is secured

TCP is responsible for providing a reliable, one-to-one, connection-oriented session. TCP establishes a connection and ensures that the other end receives any packets sent. Two hosts communicate packet results with each other. TCP also ensures that packets are decoded and sequenced properly. This connection is persistent during the session. When the session ends, the connection is torn down.

UDP provides an unreliable connectionless communication method between hosts. UDP is considered a best-effort protocol, but it’s considerably faster than TCP. The sessions don’t establish a synchronized session like the kind used in TCP, and UDP doesn’t guarantee error-free communications. The primary purpose of UDP is to send small packets of information. The application is responsible for acknowledging the correct reception of the data.

Port 22 is used by both SSH and SCP with UDP.

Port 443 is used for secure web connections – HTTPS and is a TCP port.

Thus to make sure only the Accounting computer has HTTPS access to the Administrative server you should use TCP port 443 and set the rule to allow communication between 10.4.255.10/24 (Accounting) and 10.4.255.101 (Administrative server1)

Thus to make sure that only the HR computer has access to Server2 over SCP you need use of TCP port 22 and set the rule to allow communication between 10.4.255.10/23 (HR) and 10.4.255.2 (server2)

Thus to make sure that the IT computer can access both the Administrative servers you need to use a port and accompanying port number and set the rule to allow communication between:

10.4.255.10.25 (IT computer) and 10.4.255.101 (Administrative server1) 10.4.255.10.25 (IT computer) and 10.4.255.102 (Administrative server2)

References:

Dulaney, Emmett and Chuck Eastton, CompTIA Security Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 77, 83, 96, 157.

Question No: 147 – (Topic 1)

A security engineer is reviewing log data and sees the output below:

POST: /payload.php HTTP/1.1 HOST: localhost

Accept: */*

Referrer: http://localhost/

*******

HTTP/1.1 403 Forbidden Connection: close

Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was MOST likely being used to generate this log?

  1. Host-based Intrusion Detection System

  2. Web application firewall

  3. Network-based Intrusion Detection System

  4. Stateful Inspection Firewall

  5. URL Content Filter

Answer: B Explanation:

A web application firewall is a device, server add-on, virtual service, or system filter that defines a strict set of communication rules for a website and all visitors. It’s intended to be an application-specific firewall to prevent cross-site scripting, SQL injection, and other web application attacks.

Question No: 148 – (Topic 1)

TION NO: 134

Which of the following ports is used for SSH, by default?

  1. 23

  2. 32

  3. 12

  4. 22

Answer: D Explanation:

Secure Shell (SSH) is a cryptographic network protocol for securing data communication. It establishes a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login, remote command execution, but any network service can be secured with SSH. SSH uses port 22.

Question No: 149 – (Topic 1)

An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend against them as well. Which of the following is being described here?

  1. NIDS

  2. NIPS

  3. HIPS

  4. HIDS

Answer: B Explanation:

Network-based intrusion prevention system (NIPS) monitors the entire network for suspicious traffic by analyzing protocol activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it

Question No: 150 – (Topic 1)

A company has several conference rooms with wired network jacks that are used by both employees and guests. Employees need access to internal resources and guests only need access to the Internet. Which of the following combinations is BEST to meet the requirements?

  1. NAT and DMZ

  2. VPN and IPSec

  3. Switches and a firewall

  4. 802.1x and VLANs

Answer: D Explanation:

802.1x is a port-based authentication mechanism. It’s based on Extensible Authentication Protocol (EAP) and is commonly used in closed-environment wireless networks. 802.1x was initially used to compensate for the weaknesses of Wired Equivalent Privacy (WEP), but today it’s often used as a component in more complex authentication and connection- management systems, including Remote Authentication Dial-In User Service (RADIUS), Diameter, Cisco System’s Terminal Access Controller Access-Control System Plus (TACACS ), and Network Access Control (NAC).

A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. By default, all ports on a switch are part of VLAN 1. But as the switch administrator changes the VLAN assignment on a port-by-port basis, various ports can be grouped together and be distinct from other VLAN port designations. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.

100% Free Download!
Download Free Demo:JK0-022 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert JK0-022 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *