Best Deal for Unlimited Exam Access
The Fastest Way to Pass Any Exam for Only $149.00

Exam Code: JK0-802
Exam Name: CompTIA Academic/E2C A+ Voucher Only
Vendor: CompTIA

993 Questions & Answers
Last update: May 22,20
Verified by IT Certification Professionals

Get Instant Access to JK0-802 Exam and 1,200+ More

Unlimited Lifetime Access Package

  • Access any exam on the entire ActualTests site for life!

  • Our $149.00 Unlimited Access Package buys unlimited access to our library of downloadable PDFs for 1200+ exams.

  • You download the exam you need, and come back and download again when you need more. Your PDF is ready to read or print, and when there is an update, you can download the new version. Download one exam or all the exams - its up to you.

$149.00/lifetime

Actual Test Exam Engine

Upgrade your Unlimited Lifetime Access with our interactive Exam Engine! Working with the ActualTests Exam Engine is just like taking the actual tests, except we also give you the correct answers. See More >>

Total Cost: $348.00

CompTIA JK0-802 Exam Reviews JK0-802 Exam Engine Features

CompTIA JK0-802 Exam Tips

Which two parts does an IDS (Intrusion Detection Systems) typically consist of? (Choose two)

Answers:
A. A console. (correct)
B. A router.
C. A sensor. (correct)
D. A firewall
E. A processor.

Explanation:
Sensor's are installed at various locations of the network to sense an intruder, which reports the information back to a console so an administrator can be informed of the details of the intrusion.

You work as a security administrator at TestKing.com. You need to confine sensitive data traffic to a specific subnet. Which of the following should you use?

Answers:
A. A router.
B. A server.
C. A switch. (correct)
D. A VPN (Virtual Private Network).

Explanation:
You can use a switch to segment a specific network or subnet by using VLANs.

What type of system will examine all packets on an internal network for known attack signatures?

Answers:
A. A vulnerability scanner.
B. A packet filter.
C. A host based IDS (Intrusion Detection System).
D. A network based IDS (Intrusion Detection System). (correct)

Explanation:
Network based Intrusion Detection System work by examining ALL packets for known attack signatures, even DoS attacks as they happen.

Identify the IDS that will be used to acquire the most data about the organization?

Answers:
A. You should employ the host based IDS.
B. You should employ the server based IDS.
C. You should employ the Unix based IDS.
D. You should employ the network based IDS. (correct)

Which network devices are used to eradicate data packets capturing that are not intended for the host computer?

Answers:
A. The hub.
B. The router.
C. The gateway.
D. The switch. (correct)

Which form of operation permits the capturing of information that travels on devices on a local Ethernet segment and packets intended for the host machine?

Answers:
A. Transport operation.
B. Broadcast operation.
C. Promiscuous operation. (correct)
D. Tunnel operation.
E. Unicast operation.

Identify the software or hardware device that will only permit approved network traffic in or out of a computer or network?

Answers:
A. The anti-virus program authorized network traffic in or out of a computer or network.
B. The packet sniffer authorized network traffic in or out of a computer or network.
C. The honeypot authorized network traffic in or out of a computer or network.
D. The firewall authorized network traffic in or out of a computer or network. (correct)

Identify the removable media that are write-once and can be used to archive the security logs?

Answers:
A. The CD-R is most appropriate. (correct)
B. The USB drive is most appropriate.
C. The Hard disk is most appropriate.
D. The Tape is most appropriate.

Which of the following media types provides the most protection against electromagnetic interference?

Answers:
A. Coaxial cable.
B. UTP (Unshielded Twisted Pair).
C. STP (Shielded Twisted Pair).
D. Fiber optic cable. (correct)

Explanation:
Fiber optic cables are not affected by electromagnetic interference or radio frequency interference and it is difficult to eavesdrop; because they don't work the same way as conventional cables. They're made out of glass (which is an insulator) and transmit pulses of light through that glass.