[Free] 2017(Nov) Dumps4cert Testinsides CompTIA JK0-022 Dumps with VCE and PDF Download 171-180

Dumps4cert 2017 Nov CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-022.html

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 171 – (Topic 1)

A company’s business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following network elements would be used to support the new business model?

  1. Software as a Service

  2. DMZ

  3. Remote access support

  4. Infrastructure as a Service

Answer: A Explanation:

Software as a Service (SaaS) allows for on-demand online access to specific software applications or suites without having to install it locally. This will allow the data center to continue providing network and security services.

Question No: 172 – (Topic 1)

Which of the following network design elements allows for many internal devices to share one public IP address?

  1. DNAT

  2. PAT

  3. DNS

  4. DMZ

Answer: B Explanation:

Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.

Most home networks use PAT. In such a scenario, the Internet Service Provider (ISP) assigns a single IP address to the home network#39;s router. When Computer X logs on the Internet, the router assigns the client a port number, which is appended to the internal IP address. This, in effect, gives Computer X a unique address. If Computer Z logs on the Internet at the same time, the router assigns it the same local IP address with a different port number. Although both computers are sharing the same public IP address and accessing the Internet at the same time, the router knows exactly which computer to send specific packets to because each computer has a unique internal address.

Question No: 173 – (Topic 1)

A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner. Which of the following protocol would be MOST appropriate?

  1. HTTPS

  2. SSH

  3. FTP

  4. TLS

Answer: D

Explanation: Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering.

Question No: 174 – (Topic 1)

Which of the following should be performed to increase the availability of IP telephony by prioritizing traffic?

  1. Subnetting

  2. NAT

  3. Quality of service

  4. NAC

Answer: C Explanation:

Quality of Service (QoS) facilitates the deployment of media-rich applications, such as video conferencing and Internet Protocol (IP) telephony, without adversely affecting network throughput.

Question No: 175 – (Topic 1)

Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete’s access to this site?

  1. Internet content filter

  2. Firewall

  3. Proxy server

  4. Protocol analyzer

Answer: A

Explanation:

Web filtering software is designed to restrict or control the content a reader is authorised to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means.

Question No: 176 – (Topic 1)

A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario?

  1. WPA2

  2. WPA

  3. IPv6

  4. IPv4

Answer: C Explanation:

IPSec security is built into IPv6.

Question No: 177 – (Topic 1)

A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO).

  1. TCP 21

  2. TCP 23

  3. TCP 53

  4. UDP 23

  5. UDP 53

Answer: C,E Explanation:

DNS uses TCP and UDP port 53. TCP port 53 is used for zone transfers, whereas UDP port 53 is used for queries.

Question No: 178 – (Topic 1)

Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?

Server 1: 192.168.100.6

Server 2: 192.168.100.9

Server 3: 192.169.100.20

A. /24 B. /27 C. /28 D. /29 E. /30

Answer: D Explanation:

Using this option will result in all three servers using host addresses on different broadcast domains.

Question No: 179 – (Topic 1)

The security administrator at ABC company received the following log information from an external party:

10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal

10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force

10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan

The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?

  1. A NIDS was used in place of a NIPS.

  2. The log is not in UTC.

  3. The external party uses a firewall.

  4. ABC company uses PAT.

Answer: D Explanation:

PAT would ensure that computers on ABC’s LAN translate to the same IP address, but with a different port number assignment. The log information shows the IP address, not the port number, making it impossible to pin point the exact source.

Question No: 180 – (Topic 1)

Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:

  1. Redundant systems.

  2. Separation of duties.

  3. Layered security.

  4. Application control.

Answer: C Explanation:

Layered security is the practice of combining multiple mitigating security controls to protect resources and data.

Topic 2, Compliance and Operational Security

100% Free Download!
Download Free Demo:JK0-022 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert JK0-022 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *