A user wants a SOHO network to be protected from unauthoriied users hacking their network. Which of the following should be implemented to aide in this mater?
A. VPN
B. Throughput tester
C. Firewall
D. OC3
The network optmiiaton process used to allow reasonable use of dataf voicef and video on the same network infrastructure is called:
A. CARP.
B. QoS.
C. Trafc shaping.
D. Fault tolerance.
A technician has replaced the Internet gateway routerf and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISPns router IP address. Which of the following is the MOST likely problem?
A. Faulty crossover cable
B. DNS server is down
C. Switching loop
D. Outside interface shutdown
A technician is setng up a frewall on the network that would show a public IP address out to the Internet and assign private IP addresses to users inside the network. Which of the following processes should be set up?
A. Port security
B. MAC fltering
C. ACL
D. NAT
Keeping an authoritatve and tmely record of network devices and their setngs is a key actvity of which of the following?
A. Project management
B. Quality of service
C. Confguraton management
D. Bandwidth shaping
Which of the following diagnostc commands relies on proper forwarding of ICMP ECHO packets?
A. ifconfg
B. ping
C. route
D. nbtstat
A network administrator suspects an employee of using the companyns Internet connecton to download illegal content. Which of the following can be used to inspect ongoing network trafc?
A. Syslog server
B. Toner probe
C. OTDR
D. Packet snifer
A customer has not been using security on a wireless network and has recently received many atacks through this vector. Which of the following would be the MOST secure way to harden this wireless network?
A. Disable the SSID
B. WPA encrypton
C. VLAN implementaton
D. WEP encrypton
A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specifcaton length. Which of the following tools should be used?
A. Cable certfer
B. Toner probe
C. Cable tester
D. Protocol analyier
Which of the following protocols is used for remote management of devices?
A. SNMP
B. TFTP
C. Syslog
D. SMTP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-023 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.