|CompTIA JK0-802 : CompTIA A+ Certification Exam (JK0-802)||993 Questions & Answers||Updated: Mar 12,19|
Immediate access to the CompTIA JK0-802 Exam and 1800+ other exam PDFs.
This is the BEST deal at only $149.00 for unlimited access. Pass FAST with actual answers to actual questions - We Guarantee You Pass!
Both of our Exams Packages come with all of our CompTIA Exams including all ActualTests JK0-802 tests. Find the same core area CompTIA questions with professionally verified answers, and PASS YOUR EXAM.
Option 1: JK0-802 exam and 1,800+ Other Exams
OR - Upgrade the Unlimited Access Package to include our Exam Engine. Know more than just the answers, understand the solutions! There is an Exam Engine for each of the 1,800 tests, including CompTIA JK0-802. Why Upgrade?
Option 2: JK0-802 exam, 1,800+ Other Exams PLUS Exam Engine
ActualTests JK0-802 Exam Engine Features
Customize your CompTIA A+ Certification Exam (JK0-802) certification experience.
CompTIA JK0-802 Exam Tips
Which two parts does an IDS (Intrusion Detection Systems) typically consist of? (Choose two)
A. A console. (correct)
B. A router.
C. A sensor. (correct)
D. A firewall
E. A processor.
Sensor's are installed at various locations of the network to sense an intruder, which reports the information back to a console so an administrator can be informed of the details of the intrusion.
You work as a security administrator at TestKing.com. You need to confine sensitive data traffic to a specific subnet. Which of the following should you use?
A. A router.
B. A server.
C. A switch. (correct)
D. A VPN (Virtual Private Network).
You can use a switch to segment a specific network or subnet by using VLANs.
What type of system will examine all packets on an internal network for known attack signatures?
A. A vulnerability scanner.
B. A packet filter.
C. A host based IDS (Intrusion Detection System).
D. A network based IDS (Intrusion Detection System). (correct)
Network based Intrusion Detection System work by examining ALL packets for known attack signatures, even DoS attacks as they happen.
Identify the IDS that will be used to acquire the most data about the organization?
A. You should employ the host based IDS.
B. You should employ the server based IDS.
C. You should employ the Unix based IDS.
D. You should employ the network based IDS. (correct)
Which network devices are used to eradicate data packets capturing that are not intended for the host computer?
A. The hub.
B. The router.
C. The gateway.
D. The switch. (correct)
Which form of operation permits the capturing of information that travels on devices on a local Ethernet segment and packets intended for the host machine?
A. Transport operation.
B. Broadcast operation.
C. Promiscuous operation. (correct)
D. Tunnel operation.
E. Unicast operation.
Identify the software or hardware device that will only permit approved network traffic in or out of a computer or network?
A. The anti-virus program authorized network traffic in or out of a computer or network.
B. The packet sniffer authorized network traffic in or out of a computer or network.
C. The honeypot authorized network traffic in or out of a computer or network.
D. The firewall authorized network traffic in or out of a computer or network. (correct)
Identify the removable media that are write-once and can be used to archive the security logs?
A. The CD-R is most appropriate. (correct)
B. The USB drive is most appropriate.
C. The Hard disk is most appropriate.
D. The Tape is most appropriate.
Which of the following media types provides the most protection against electromagnetic interference?
A. Coaxial cable.
B. UTP (Unshielded Twisted Pair).
C. STP (Shielded Twisted Pair).
D. Fiber optic cable. (correct)
Fiber optic cables are not affected by electromagnetic interference or radio frequency interference and it is difficult to eavesdrop; because they don't work the same way as conventional cables. They're made out of glass (which is an insulator) and transmit pulses of light through that glass.
Related Certifications Included
Related A+ Exams Included
All Major Credit CardsWe accept Visa, Mastercard, Electron and American Express. You can also pay us via PayPal.
SSL Secure Transactions